SAMLProvider Serializer
| Name | Type | Description | Notes |
|---|---|---|---|
| pk | int | [readonly] | |
| name | str | ||
| authentication_flow | UUID | Flow used for authentication when the associated application is accessed by an un-authenticated user. | [optional] |
| authorization_flow | UUID | Flow used when authorizing this provider. | |
| invalidation_flow | UUID | Flow used ending the session from a provider. | |
| property_mappings | List[UUID] | [optional] | |
| component | str | Get object component so that we know how to edit the object | [readonly] |
| assigned_application_slug | str | Internal application name, used in URLs. | [readonly] |
| assigned_application_name | str | Application's display Name. | [readonly] |
| assigned_backchannel_application_slug | str | Internal application name, used in URLs. | [readonly] |
| assigned_backchannel_application_name | str | Application's display Name. | [readonly] |
| verbose_name | str | Return object's verbose_name | [readonly] |
| verbose_name_plural | str | Return object's plural verbose_name | [readonly] |
| meta_model_name | str | Return internal model name | [readonly] |
| acs_url | str | ||
| sls_url | str | Single Logout Service URL where the logout response should be sent. | [optional] |
| audience | str | Value of the audience restriction field of the assertion. When left empty, no audience restriction will be added. | [optional] |
| issuer | str | Also known as EntityID | [optional] |
| assertion_valid_not_before | str | Assertion valid not before current time + this value (Format: hours=-1;minutes=-2;seconds=-3). | [optional] |
| assertion_valid_not_on_or_after | str | Assertion not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). | [optional] |
| session_valid_not_on_or_after | str | Session not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). | [optional] |
| name_id_mapping | UUID | Configure how the NameID value will be created. When left empty, the NameIDPolicy of the incoming request will be considered | [optional] |
| authn_context_class_ref_mapping | UUID | Configure how the AuthnContextClassRef value will be created. When left empty, the AuthnContextClassRef will be set based on which authentication methods the user used to authenticate. | [optional] |
| digest_algorithm | DigestAlgorithmEnum | [optional] | |
| signature_algorithm | SignatureAlgorithmEnum | [optional] | |
| signing_kp | UUID | Keypair used to sign outgoing Responses going to the Service Provider. | [optional] |
| verification_kp | UUID | When selected, incoming assertion's Signatures will be validated against this certificate. To allow unsigned Requests, leave on default. | [optional] |
| encryption_kp | UUID | When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key. | [optional] |
| sign_assertion | bool | [optional] | |
| sign_response | bool | [optional] | |
| sign_logout_request | bool | [optional] | |
| sign_logout_response | bool | [optional] | |
| sp_binding | SAMLBindingsEnum | This determines how authentik sends the response back to the Service Provider. | [optional] |
| sls_binding | SAMLBindingsEnum | This determines how authentik sends the logout response back to the Service Provider. | [optional] |
| logout_method | SAMLLogoutMethods | Method to use for logout. Front-channel iframe loads all logout URLs simultaneously in hidden iframes. Front-channel native uses your active browser tab to send post requests and redirect to providers. Back-channel sends logout requests directly from the server without user interaction (requires POST SLS binding). | [optional] |
| default_relay_state | str | Default relay_state value for IDP-initiated logins | [optional] |
| default_name_id_policy | SAMLNameIDPolicyEnum | [optional] | |
| url_download_metadata | str | Get metadata download URL | [readonly] |
| url_sso_post | str | Get SSO Post URL | [readonly] |
| url_sso_redirect | str | Get SSO Redirect URL | [readonly] |
| url_sso_init | str | Get SSO IDP-Initiated URL | [readonly] |
| url_slo_post | str | Get SLO POST URL | [readonly] |
| url_slo_redirect | str | Get SLO redirect URL | [readonly] |
from authentik_client.models.saml_provider import SAMLProvider
# TODO update the JSON string below
json = "{}"
# create an instance of SAMLProvider from a JSON string
saml_provider_instance = SAMLProvider.from_json(json)
# print the JSON string representation of the object
print(SAMLProvider.to_json())
# convert the object into a dict
saml_provider_dict = saml_provider_instance.to_dict()
# create an instance of SAMLProvider from a dict
saml_provider_from_dict = SAMLProvider.from_dict(saml_provider_dict)