/*! * Copyright (c) 2017-present, Okta, Inc. and/or its affiliates. All rights reserved. * The Okta software accompanied by this notice is provided pursuant to the Apache License, Version 2.0 (the "License.") * * You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0. * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * * See the License for the specific language governing permissions and limitations under the License. */ /** * Okta Admin Management * Allows customers to easily access the Okta Management APIs * * OpenAPI spec version: 5.1.0 * Contact: devex-public@okta.com * * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). * https://openapi-generator.tech * Do not edit the class manually. */ /** * SAML 1.1 sign-on mode attributes */ export declare class Saml11ApplicationSettingsSignOn { /** * The intended audience of the SAML assertion. This is usually the Entity ID of your application. */ 'audienceOverride'?: string; /** * The URL of the resource to direct users after they successfully sign in to the SP using SAML. See the SP documentation to check if you need to specify a RelayState. In most instances, you can leave this field blank. */ 'defaultRelayState'?: string; /** * The location where the application can present the SAML assertion. This is usually the Single Sign-On (SSO) URL. */ 'recipientOverride'?: string; /** * Assertion Consumer Services (ACS) URL value for the Service Provider (SP). This URL is always used for Identity Provider (IdP) initiated sign-on requests. */ 'ssoAcsUrlOverride'?: string; static readonly discriminator: string | undefined; static readonly attributeTypeMap: Array<{ name: string; baseName: string; type: string; format: string; }>; static getAttributeTypeMap(): { name: string; baseName: string; type: string; format: string; }[]; constructor(); }