/** * authentik * Making authentication simple. * * The version of the OpenAPI document: 2025.6.3 * Contact: hello@goauthentik.io * * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). * https://openapi-generator.tech * Do not edit the class manually. */ import type { NameIdPolicyEnum } from './NameIdPolicyEnum'; import type { PolicyEngineMode } from './PolicyEngineMode'; import type { BindingTypeEnum } from './BindingTypeEnum'; import type { DigestAlgorithmEnum } from './DigestAlgorithmEnum'; import type { UserMatchingModeEnum } from './UserMatchingModeEnum'; import type { SignatureAlgorithmEnum } from './SignatureAlgorithmEnum'; import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum'; /** * SAMLSource Serializer * @export * @interface PatchedSAMLSourceRequest */ export interface PatchedSAMLSourceRequest { /** * Source's display Name. * @type {string} * @memberof PatchedSAMLSourceRequest */ name?: string; /** * Internal source name, used in URLs. * @type {string} * @memberof PatchedSAMLSourceRequest */ slug?: string; /** * * @type {boolean} * @memberof PatchedSAMLSourceRequest */ enabled?: boolean; /** * Flow to use when authenticating existing users. * @type {string} * @memberof PatchedSAMLSourceRequest */ authenticationFlow?: string | null; /** * Flow to use when enrolling new users. * @type {string} * @memberof PatchedSAMLSourceRequest */ enrollmentFlow?: string | null; /** * * @type {Array} * @memberof PatchedSAMLSourceRequest */ userPropertyMappings?: Array; /** * * @type {Array} * @memberof PatchedSAMLSourceRequest */ groupPropertyMappings?: Array; /** * * @type {PolicyEngineMode} * @memberof PatchedSAMLSourceRequest */ policyEngineMode?: PolicyEngineMode; /** * How the source determines if an existing user should be authenticated or a new user enrolled. * @type {UserMatchingModeEnum} * @memberof PatchedSAMLSourceRequest */ userMatchingMode?: UserMatchingModeEnum; /** * * @type {string} * @memberof PatchedSAMLSourceRequest */ userPathTemplate?: string; /** * How the source determines if an existing group should be used or a new group created. * @type {GroupMatchingModeEnum} * @memberof PatchedSAMLSourceRequest */ groupMatchingMode?: GroupMatchingModeEnum; /** * Flow used before authentication. * @type {string} * @memberof PatchedSAMLSourceRequest */ preAuthenticationFlow?: string; /** * Also known as Entity ID. Defaults the Metadata URL. * @type {string} * @memberof PatchedSAMLSourceRequest */ issuer?: string; /** * URL that the initial Login request is sent to. * @type {string} * @memberof PatchedSAMLSourceRequest */ ssoUrl?: string; /** * Optional URL if your IDP supports Single-Logout. * @type {string} * @memberof PatchedSAMLSourceRequest */ sloUrl?: string | null; /** * Allows authentication flows initiated by the IdP. This can be a security risk, as no validation of the request ID is done. * @type {boolean} * @memberof PatchedSAMLSourceRequest */ allowIdpInitiated?: boolean; /** * NameID Policy sent to the IdP. Can be unset, in which case no Policy is sent. * @type {NameIdPolicyEnum} * @memberof PatchedSAMLSourceRequest */ nameIdPolicy?: NameIdPolicyEnum; /** * * @type {BindingTypeEnum} * @memberof PatchedSAMLSourceRequest */ bindingType?: BindingTypeEnum; /** * When selected, incoming assertion's Signatures will be validated against this certificate. To allow unsigned Requests, leave on default. * @type {string} * @memberof PatchedSAMLSourceRequest */ verificationKp?: string | null; /** * Keypair used to sign outgoing Responses going to the Identity Provider. * @type {string} * @memberof PatchedSAMLSourceRequest */ signingKp?: string | null; /** * * @type {DigestAlgorithmEnum} * @memberof PatchedSAMLSourceRequest */ digestAlgorithm?: DigestAlgorithmEnum; /** * * @type {SignatureAlgorithmEnum} * @memberof PatchedSAMLSourceRequest */ signatureAlgorithm?: SignatureAlgorithmEnum; /** * Time offset when temporary users should be deleted. This only applies if your IDP uses the NameID Format 'transient', and the user doesn't log out manually. (Format: hours=1;minutes=2;seconds=3). * @type {string} * @memberof PatchedSAMLSourceRequest */ temporaryUserDeleteAfter?: string; /** * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key. * @type {string} * @memberof PatchedSAMLSourceRequest */ encryptionKp?: string | null; } /** * Check if a given object implements the PatchedSAMLSourceRequest interface. */ export declare function instanceOfPatchedSAMLSourceRequest(value: object): value is PatchedSAMLSourceRequest; export declare function PatchedSAMLSourceRequestFromJSON(json: any): PatchedSAMLSourceRequest; export declare function PatchedSAMLSourceRequestFromJSONTyped(json: any, ignoreDiscriminator: boolean): PatchedSAMLSourceRequest; export declare function PatchedSAMLSourceRequestToJSON(json: any): PatchedSAMLSourceRequest; export declare function PatchedSAMLSourceRequestToJSONTyped(value?: PatchedSAMLSourceRequest | null, ignoreDiscriminator?: boolean): any; //# sourceMappingURL=PatchedSAMLSourceRequest.d.ts.map