/** * authentik * Making authentication simple. * * The version of the OpenAPI document: 2025.6.3 * Contact: hello@goauthentik.io * * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). * https://openapi-generator.tech * Do not edit the class manually. */ import type { RedirectURIRequest } from './RedirectURIRequest'; import type { ClientTypeEnum } from './ClientTypeEnum'; import type { SubModeEnum } from './SubModeEnum'; import type { IssuerModeEnum } from './IssuerModeEnum'; /** * OAuth2Provider Serializer * @export * @interface PatchedOAuth2ProviderRequest */ export interface PatchedOAuth2ProviderRequest { /** * * @type {string} * @memberof PatchedOAuth2ProviderRequest */ name?: string; /** * Flow used for authentication when the associated application is accessed by an un-authenticated user. * @type {string} * @memberof PatchedOAuth2ProviderRequest */ authenticationFlow?: string | null; /** * Flow used when authorizing this provider. * @type {string} * @memberof PatchedOAuth2ProviderRequest */ authorizationFlow?: string; /** * Flow used ending the session from a provider. * @type {string} * @memberof PatchedOAuth2ProviderRequest */ invalidationFlow?: string; /** * * @type {Array} * @memberof PatchedOAuth2ProviderRequest */ propertyMappings?: Array; /** * Confidential clients are capable of maintaining the confidentiality of their credentials. Public clients are incapable * @type {ClientTypeEnum} * @memberof PatchedOAuth2ProviderRequest */ clientType?: ClientTypeEnum; /** * * @type {string} * @memberof PatchedOAuth2ProviderRequest */ clientId?: string; /** * * @type {string} * @memberof PatchedOAuth2ProviderRequest */ clientSecret?: string; /** * Access codes not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). * @type {string} * @memberof PatchedOAuth2ProviderRequest */ accessCodeValidity?: string; /** * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). * @type {string} * @memberof PatchedOAuth2ProviderRequest */ accessTokenValidity?: string; /** * Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). * @type {string} * @memberof PatchedOAuth2ProviderRequest */ refreshTokenValidity?: string; /** * Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint. * @type {boolean} * @memberof PatchedOAuth2ProviderRequest */ includeClaimsInIdToken?: boolean; /** * Key used to sign the tokens. * @type {string} * @memberof PatchedOAuth2ProviderRequest */ signingKey?: string | null; /** * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs. * @type {string} * @memberof PatchedOAuth2ProviderRequest */ encryptionKey?: string | null; /** * * @type {Array} * @memberof PatchedOAuth2ProviderRequest */ redirectUris?: Array; /** * Configure what data should be used as unique User Identifier. For most cases, the default should be fine. * @type {SubModeEnum} * @memberof PatchedOAuth2ProviderRequest */ subMode?: SubModeEnum; /** * Configure how the issuer field of the ID Token should be filled. * @type {IssuerModeEnum} * @memberof PatchedOAuth2ProviderRequest */ issuerMode?: IssuerModeEnum; /** * * @type {Array} * @memberof PatchedOAuth2ProviderRequest */ jwtFederationSources?: Array; /** * * @type {Array} * @memberof PatchedOAuth2ProviderRequest */ jwtFederationProviders?: Array; } /** * Check if a given object implements the PatchedOAuth2ProviderRequest interface. */ export declare function instanceOfPatchedOAuth2ProviderRequest(value: object): value is PatchedOAuth2ProviderRequest; export declare function PatchedOAuth2ProviderRequestFromJSON(json: any): PatchedOAuth2ProviderRequest; export declare function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminator: boolean): PatchedOAuth2ProviderRequest; export declare function PatchedOAuth2ProviderRequestToJSON(json: any): PatchedOAuth2ProviderRequest; export declare function PatchedOAuth2ProviderRequestToJSONTyped(value?: PatchedOAuth2ProviderRequest | null, ignoreDiscriminator?: boolean): any; //# sourceMappingURL=PatchedOAuth2ProviderRequest.d.ts.map