Skip to content

Latest commit

 

History

History
72 lines (63 loc) · 5.39 KB

File metadata and controls

72 lines (63 loc) · 5.39 KB

SAMLProvider

SAMLProvider Serializer

Properties

Name Type Description Notes
pk int [readonly]
name str
authentication_flow UUID Flow used for authentication when the associated application is accessed by an un-authenticated user. [optional]
authorization_flow UUID Flow used when authorizing this provider.
invalidation_flow UUID Flow used ending the session from a provider.
property_mappings List[UUID] [optional]
component str Get object component so that we know how to edit the object [readonly]
assigned_application_slug str Internal application name, used in URLs. [readonly]
assigned_application_name str Application's display Name. [readonly]
assigned_backchannel_application_slug str Internal application name, used in URLs. [readonly]
assigned_backchannel_application_name str Application's display Name. [readonly]
verbose_name str Return object's verbose_name [readonly]
verbose_name_plural str Return object's plural verbose_name [readonly]
meta_model_name str Return internal model name [readonly]
acs_url str
sls_url str Single Logout Service URL where the logout response should be sent. [optional]
audience str Value of the audience restriction field of the assertion. When left empty, no audience restriction will be added. [optional]
issuer str Also known as EntityID [optional]
assertion_valid_not_before str Assertion valid not before current time + this value (Format: hours=-1;minutes=-2;seconds=-3). [optional]
assertion_valid_not_on_or_after str Assertion not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). [optional]
session_valid_not_on_or_after str Session not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). [optional]
name_id_mapping UUID Configure how the NameID value will be created. When left empty, the NameIDPolicy of the incoming request will be considered [optional]
authn_context_class_ref_mapping UUID Configure how the AuthnContextClassRef value will be created. When left empty, the AuthnContextClassRef will be set based on which authentication methods the user used to authenticate. [optional]
digest_algorithm DigestAlgorithmEnum [optional]
signature_algorithm SignatureAlgorithmEnum [optional]
signing_kp UUID Keypair used to sign outgoing Responses going to the Service Provider. [optional]
verification_kp UUID When selected, incoming assertion's Signatures will be validated against this certificate. To allow unsigned Requests, leave on default. [optional]
encryption_kp UUID When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key. [optional]
sign_assertion bool [optional]
sign_response bool [optional]
sign_logout_request bool [optional]
sign_logout_response bool [optional]
sp_binding SAMLBindingsEnum This determines how authentik sends the response back to the Service Provider. [optional]
sls_binding SAMLBindingsEnum This determines how authentik sends the logout response back to the Service Provider. [optional]
logout_method SAMLLogoutMethods Method to use for logout. Front-channel iframe loads all logout URLs simultaneously in hidden iframes. Front-channel native uses your active browser tab to send post requests and redirect to providers. Back-channel sends logout requests directly from the server without user interaction (requires POST SLS binding). [optional]
default_relay_state str Default relay_state value for IDP-initiated logins [optional]
default_name_id_policy SAMLNameIDPolicyEnum [optional]
url_download_metadata str Get metadata download URL [readonly]
url_sso_post str Get SSO Post URL [readonly]
url_sso_redirect str Get SSO Redirect URL [readonly]
url_sso_init str Get SSO IDP-Initiated URL [readonly]
url_slo_post str Get SLO POST URL [readonly]
url_slo_redirect str Get SLO redirect URL [readonly]

Example

from authentik_client.models.saml_provider import SAMLProvider

# TODO update the JSON string below
json = "{}"
# create an instance of SAMLProvider from a JSON string
saml_provider_instance = SAMLProvider.from_json(json)
# print the JSON string representation of the object
print(SAMLProvider.to_json())

# convert the object into a dict
saml_provider_dict = saml_provider_instance.to_dict()
# create an instance of SAMLProvider from a dict
saml_provider_from_dict = SAMLProvider.from_dict(saml_provider_dict)

[Back to Model list] [Back to API list] [Back to README]