Documentation
¶
Index ¶
- Constants
- type ACR
- type ACRs
- type API
- type APIGroupMetadata
- type APIs
- type AWSMetadata
- type AccessRequestData
- type AccessRequestDataWithError
- func (m *AccessRequestDataWithError) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *AccessRequestDataWithError) MarshalBinary() ([]byte, error)
- func (m *AccessRequestDataWithError) UnmarshalBinary(b []byte) error
- func (m *AccessRequestDataWithError) Validate(formats strfmt.Registry) error
- type AdvancedConfiguration
- type AffiliationDescriptor
- type ApigeeMetadata
- type ArculixAuth
- type Attr
- type Attribute
- type AttributeAuthorityDescriptor
- func (m *AttributeAuthorityDescriptor) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *AttributeAuthorityDescriptor) MarshalBinary() ([]byte, error)
- func (m *AttributeAuthorityDescriptor) UnmarshalBinary(b []byte) error
- func (m *AttributeAuthorityDescriptor) Validate(formats strfmt.Registry) error
- type AttributeConsumingService
- func (m *AttributeConsumingService) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *AttributeConsumingService) MarshalBinary() ([]byte, error)
- func (m *AttributeConsumingService) UnmarshalBinary(b []byte) error
- func (m *AttributeConsumingService) Validate(formats strfmt.Registry) error
- type AttributeValue
- type Attributes
- type AuditConsentKind
- type AuditEvent
- type AuditEventMetadata
- type AuditEventPayloads
- type AuditEvents
- type Auth0Credentials
- type Auth0IDP
- type Auth0Settings
- type AuthenticationContext
- type AuthenticationContextAttribute
- func (m *AuthenticationContextAttribute) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *AuthenticationContextAttribute) MarshalBinary() ([]byte, error)
- func (m *AuthenticationContextAttribute) UnmarshalBinary(b []byte) error
- func (m *AuthenticationContextAttribute) Validate(formats strfmt.Registry) error
- type AuthenticationContextSettings
- func (m *AuthenticationContextSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *AuthenticationContextSettings) MarshalBinary() ([]byte, error)
- func (m *AuthenticationContextSettings) UnmarshalBinary(b []byte) error
- func (m *AuthenticationContextSettings) Validate(formats strfmt.Registry) error
- type AuthenticationMechanisms
- type AuthnAuthorityDescriptor
- func (m *AuthnAuthorityDescriptor) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *AuthnAuthorityDescriptor) MarshalBinary() ([]byte, error)
- func (m *AuthnAuthorityDescriptor) UnmarshalBinary(b []byte) error
- func (m *AuthnAuthorityDescriptor) Validate(formats strfmt.Registry) error
- type AuthorizationDetail
- type AuthorizationDetailType
- type AuthorizationDetailWithService
- func (m *AuthorizationDetailWithService) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *AuthorizationDetailWithService) MarshalBinary() ([]byte, error)
- func (m *AuthorizationDetailWithService) UnmarshalBinary(b []byte) error
- func (m *AuthorizationDetailWithService) Validate(formats strfmt.Registry) error
- type AuthorizationDetailWithServiceID
- func (m *AuthorizationDetailWithServiceID) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *AuthorizationDetailWithServiceID) MarshalBinary() ([]byte, error)
- func (m *AuthorizationDetailWithServiceID) UnmarshalBinary(b []byte) error
- func (m *AuthorizationDetailWithServiceID) Validate(formats strfmt.Registry) error
- type AuthorizationDetailsWithServices
- func (m *AuthorizationDetailsWithServices) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *AuthorizationDetailsWithServices) MarshalBinary() ([]byte, error)
- func (m *AuthorizationDetailsWithServices) UnmarshalBinary(b []byte) error
- func (m *AuthorizationDetailsWithServices) Validate(formats strfmt.Registry) error
- type AutomaticKeyRotation
- type AvailableEvents
- type AzureB2CCredentials
- type AzureB2CIDP
- type AzureB2CSettings
- type AzureCredentials
- type AzureIDP
- type AzureMetadata
- type AzureSettings
- type BRConsentPayload
- type BindGroupToServiceRequest
- func (m *BindGroupToServiceRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *BindGroupToServiceRequest) MarshalBinary() ([]byte, error)
- func (m *BindGroupToServiceRequest) UnmarshalBinary(b []byte) error
- func (m *BindGroupToServiceRequest) Validate(formats strfmt.Registry) error
- type BindSystemAPIRequest
- type BruteForceLimit
- type BruteForceLimits
- type CDRArrangement
- type CDRArrangementID
- type CDRArrangementMetadata
- func (m *CDRArrangementMetadata) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *CDRArrangementMetadata) MarshalBinary() ([]byte, error)
- func (m *CDRArrangementMetadata) UnmarshalBinary(b []byte) error
- func (m *CDRArrangementMetadata) Validate(formats strfmt.Registry) error
- type CDRArrangementsAutoRemoval
- func (m *CDRArrangementsAutoRemoval) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *CDRArrangementsAutoRemoval) MarshalBinary() ([]byte, error)
- func (m *CDRArrangementsAutoRemoval) UnmarshalBinary(b []byte) error
- func (m *CDRArrangementsAutoRemoval) Validate(formats strfmt.Registry) error
- type CDRConfiguration
- type CDRCustomerID
- type CDRIndustry
- type CDRRegisterAPIVersion
- type CDRRegisterURL
- type CIBAAuthenticationService
- func (m *CIBAAuthenticationService) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *CIBAAuthenticationService) MarshalBinary() ([]byte, error)
- func (m *CIBAAuthenticationService) UnmarshalBinary(b []byte) error
- func (m *CIBAAuthenticationService) Validate(formats strfmt.Registry) error
- type CertificateInfo
- type Claim
- type ClaimGrant
- type ClaimSourceType
- type ClaimType
- type Claims
- type ClaimsGrantedPayload
- type Client
- type ClientAdminResponse
- type ClientAuditPayload
- type ClientConsentsAuditEventPayload
- func (m *ClientConsentsAuditEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ClientConsentsAuditEventPayload) MarshalBinary() ([]byte, error)
- func (m *ClientConsentsAuditEventPayload) UnmarshalBinary(b []byte) error
- func (m *ClientConsentsAuditEventPayload) Validate(formats strfmt.Registry) error
- type ClientJWK
- type ClientJWKs
- type ClientPrivacy
- type ClientTokenExchangeConfiguration
- func (m *ClientTokenExchangeConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ClientTokenExchangeConfiguration) MarshalBinary() ([]byte, error)
- func (m *ClientTokenExchangeConfiguration) UnmarshalBinary(b []byte) error
- func (m *ClientTokenExchangeConfiguration) Validate(formats strfmt.Registry) error
- type ClientsForAdmin
- type CognitoCredentials
- type CognitoIDP
- type CognitoSettings
- type ConfigImportEventPayload
- func (m *ConfigImportEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ConfigImportEventPayload) MarshalBinary() ([]byte, error)
- func (m *ConfigImportEventPayload) UnmarshalBinary(b []byte) error
- func (m *ConfigImportEventPayload) Validate(formats strfmt.Registry) error
- type Confirmation
- type Consent
- type ConsentAction
- type ConsentActionToConsent
- func (m *ConsentActionToConsent) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ConsentActionToConsent) MarshalBinary() ([]byte, error)
- func (m *ConsentActionToConsent) UnmarshalBinary(b []byte) error
- func (m *ConsentActionToConsent) Validate(formats strfmt.Registry) error
- type ConsentActionWithConsents
- func (m *ConsentActionWithConsents) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ConsentActionWithConsents) MarshalBinary() ([]byte, error)
- func (m *ConsentActionWithConsents) UnmarshalBinary(b []byte) error
- func (m *ConsentActionWithConsents) Validate(formats strfmt.Registry) error
- type ConsentActions
- type ConsentAuditEventPayload
- func (m *ConsentAuditEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ConsentAuditEventPayload) MarshalBinary() ([]byte, error)
- func (m *ConsentAuditEventPayload) UnmarshalBinary(b []byte) error
- func (m *ConsentAuditEventPayload) Validate(formats strfmt.Registry) error
- type ConsentDetails
- type ConsentGrantContext
- type ConsentGrantedEvent
- type ConsentNotifiedPayload
- func (m *ConsentNotifiedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ConsentNotifiedPayload) MarshalBinary() ([]byte, error)
- func (m *ConsentNotifiedPayload) UnmarshalBinary(b []byte) error
- func (m *ConsentNotifiedPayload) Validate(formats strfmt.Registry) error
- type ConsentPayload
- type ConsentRevokedEvent
- type ConsentService
- type ConsentStatus
- type ConsentType
- type Consents
- type ContactPerson
- type CookiesConfiguration
- type CreateClientAdminRequest
- func (m *CreateClientAdminRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *CreateClientAdminRequest) MarshalBinary() ([]byte, error)
- func (m *CreateClientAdminRequest) UnmarshalBinary(b []byte) error
- func (m *CreateClientAdminRequest) Validate(formats strfmt.Registry) error
- type CreateGatewayRequest
- type CreateOrganizationRequest
- func (m *CreateOrganizationRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *CreateOrganizationRequest) MarshalBinary() ([]byte, error)
- func (m *CreateOrganizationRequest) UnmarshalBinary(b []byte) error
- func (m *CreateOrganizationRequest) Validate(formats strfmt.Registry) error
- type CredentialPayload
- type CrossTenantAPIPolicyBinding
- func (m *CrossTenantAPIPolicyBinding) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *CrossTenantAPIPolicyBinding) MarshalBinary() ([]byte, error)
- func (m *CrossTenantAPIPolicyBinding) UnmarshalBinary(b []byte) error
- func (m *CrossTenantAPIPolicyBinding) Validate(formats strfmt.Registry) error
- type Cursor
- type CustomApp
- type CustomAppResponse
- type CustomAppsResponse
- type CustomCredentials
- type CustomIDP
- type CustomServerConsent
- type CustomSettings
- type CustomerConsentsAuditEventPayload
- func (m *CustomerConsentsAuditEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *CustomerConsentsAuditEventPayload) MarshalBinary() ([]byte, error)
- func (m *CustomerConsentsAuditEventPayload) UnmarshalBinary(b []byte) error
- func (m *CustomerConsentsAuditEventPayload) Validate(formats strfmt.Registry) error
- type DCRCreatedEventPayload
- func (m *DCRCreatedEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *DCRCreatedEventPayload) MarshalBinary() ([]byte, error)
- func (m *DCRCreatedEventPayload) UnmarshalBinary(b []byte) error
- func (m *DCRCreatedEventPayload) Validate(formats strfmt.Registry) error
- type DCRDetails
- type DCRRejectedEventPayload
- func (m *DCRRejectedEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *DCRRejectedEventPayload) MarshalBinary() ([]byte, error)
- func (m *DCRRejectedEventPayload) UnmarshalBinary(b []byte) error
- func (m *DCRRejectedEventPayload) Validate(formats strfmt.Registry) error
- type DefaultBruteForceLimit
- func (m *DefaultBruteForceLimit) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *DefaultBruteForceLimit) MarshalBinary() ([]byte, error)
- func (m *DefaultBruteForceLimit) UnmarshalBinary(b []byte) error
- func (m *DefaultBruteForceLimit) Validate(formats strfmt.Registry) error
- type DefaultBruteForceLimits
- func (m *DefaultBruteForceLimits) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *DefaultBruteForceLimits) MarshalBinary() ([]byte, error)
- func (m *DefaultBruteForceLimits) UnmarshalBinary(b []byte) error
- func (m *DefaultBruteForceLimits) Validate(formats strfmt.Registry) error
- type DefaultEmailSettings
- type DefaultSMSSettings
- type DeviceAuthorizationConfiguration
- func (m *DeviceAuthorizationConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *DeviceAuthorizationConfiguration) MarshalBinary() ([]byte, error)
- func (m *DeviceAuthorizationConfiguration) UnmarshalBinary(b []byte) error
- func (m *DeviceAuthorizationConfiguration) Validate(formats strfmt.Registry) error
- type Duration
- type DurationType
- type DynamicClientRegistrationSettings
- func (m *DynamicClientRegistrationSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *DynamicClientRegistrationSettings) MarshalBinary() ([]byte, error)
- func (m *DynamicClientRegistrationSettings) UnmarshalBinary(b []byte) error
- func (m *DynamicClientRegistrationSettings) Validate(formats strfmt.Registry) error
- type Element
- type EmailAuth
- type EmailSettings
- type EncryptionMethod
- type Endpoint
- type EntityDescriptor
- type Environment
- type Error
- type Event
- type EventAddress
- type EventIdentifier
- type EventSubject
- type ExtendedRoleResource
- type ExternalCIBAAuthenticationService
- func (m *ExternalCIBAAuthenticationService) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ExternalCIBAAuthenticationService) MarshalBinary() ([]byte, error)
- func (m *ExternalCIBAAuthenticationService) UnmarshalBinary(b []byte) error
- func (m *ExternalCIBAAuthenticationService) Validate(formats strfmt.Registry) error
- type ExternalCredentials
- type ExternalIDP
- type ExternalServiceCredentials
- func (m *ExternalServiceCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ExternalServiceCredentials) MarshalBinary() ([]byte, error)
- func (m *ExternalServiceCredentials) UnmarshalBinary(b []byte) error
- func (m *ExternalServiceCredentials) Validate(formats strfmt.Registry) error
- type ExternalSettings
- type FDXClientStatus
- type FDXConfiguration
- type FDXConsent
- type FDXConsentGrantParty
- type FDXConsentID
- type FDXConsentRevocation
- type FDXGrantedResource
- type FDXMetadata
- type FDXParty
- type FDXRequestedResource
- type FeatureResponse
- type FeaturesResponse
- type FnEnvVersion
- type Gateway
- type GatewayAPI
- type GatewayAPIGroup
- type GatewayAPIGroups
- type GatewayTokenExchangeSettings
- func (m *GatewayTokenExchangeSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *GatewayTokenExchangeSettings) MarshalBinary() ([]byte, error)
- func (m *GatewayTokenExchangeSettings) UnmarshalBinary(b []byte) error
- func (m *GatewayTokenExchangeSettings) Validate(formats strfmt.Registry) error
- type GatewayWithClient
- type Gateways
- type GithubCredentials
- type GithubEmbeddedIDP
- type GithubIDP
- type GithubSettings
- type GoogleCredentials
- type GoogleEmbeddedIDP
- type GoogleIDP
- type GoogleSettings
- type GrantIdentityPoolRoleRequest
- func (m *GrantIdentityPoolRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *GrantIdentityPoolRoleRequest) MarshalBinary() ([]byte, error)
- func (m *GrantIdentityPoolRoleRequest) UnmarshalBinary(b []byte) error
- func (m *GrantIdentityPoolRoleRequest) Validate(formats strfmt.Registry) error
- type GrantTenantRoleRequest
- func (m *GrantTenantRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *GrantTenantRoleRequest) MarshalBinary() ([]byte, error)
- func (m *GrantTenantRoleRequest) UnmarshalBinary(b []byte) error
- func (m *GrantTenantRoleRequest) Validate(formats strfmt.Registry) error
- type GrantWorkspaceRoleRequest
- func (m *GrantWorkspaceRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *GrantWorkspaceRoleRequest) MarshalBinary() ([]byte, error)
- func (m *GrantWorkspaceRoleRequest) UnmarshalBinary(b []byte) error
- func (m *GrantWorkspaceRoleRequest) Validate(formats strfmt.Registry) error
- type GraphQLField
- type GraphQLType
- type GraphQLTypes
- type HTTPRequest
- type HTTPRequestParam
- type IDPBase
- type IDPConfiguration
- type IDPDiscovery
- type IDPDiscoverySettings
- type IDPDomain
- type IDPPayload
- type IDPSSODescriptor
- type IDPSSOSettings
- type IDPTokenExchangeSettings
- func (m *IDPTokenExchangeSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *IDPTokenExchangeSettings) MarshalBinary() ([]byte, error)
- func (m *IDPTokenExchangeSettings) UnmarshalBinary(b []byte) error
- func (m *IDPTokenExchangeSettings) Validate(formats strfmt.Registry) error
- type IDPsResponse
- type IdentifierType
- type IdentityAssuranceConfiguration
- func (m *IdentityAssuranceConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *IdentityAssuranceConfiguration) MarshalBinary() ([]byte, error)
- func (m *IdentityAssuranceConfiguration) UnmarshalBinary(b []byte) error
- func (m *IdentityAssuranceConfiguration) Validate(formats strfmt.Registry) error
- type IdentityPoolIDP
- type IdentityPoolRoleSubject
- func (m *IdentityPoolRoleSubject) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *IdentityPoolRoleSubject) MarshalBinary() ([]byte, error)
- func (m *IdentityPoolRoleSubject) UnmarshalBinary(b []byte) error
- func (m *IdentityPoolRoleSubject) Validate(formats strfmt.Registry) error
- type IdentityPoolRoles
- type IdentityPoolRolesResponse
- func (m *IdentityPoolRolesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *IdentityPoolRolesResponse) MarshalBinary() ([]byte, error)
- func (m *IdentityPoolRolesResponse) UnmarshalBinary(b []byte) error
- func (m *IdentityPoolRolesResponse) Validate(formats strfmt.Registry) error
- type Image
- type Images
- type ImportServiceConfigurationResult
- func (m *ImportServiceConfigurationResult) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ImportServiceConfigurationResult) MarshalBinary() ([]byte, error)
- func (m *ImportServiceConfigurationResult) UnmarshalBinary(b []byte) error
- func (m *ImportServiceConfigurationResult) Validate(formats strfmt.Registry) error
- type IndexedEndpoint
- type InitialAccessTokenSettings
- func (m *InitialAccessTokenSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *InitialAccessTokenSettings) MarshalBinary() ([]byte, error)
- func (m *InitialAccessTokenSettings) UnmarshalBinary(b []byte) error
- func (m *InitialAccessTokenSettings) Validate(formats strfmt.Registry) error
- type IntelliTrustCredentials
- func (m *IntelliTrustCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *IntelliTrustCredentials) MarshalBinary() ([]byte, error)
- func (m *IntelliTrustCredentials) UnmarshalBinary(b []byte) error
- func (m *IntelliTrustCredentials) Validate(formats strfmt.Registry) error
- type IntelliTrustIDP
- type IntelliTrustSettings
- type Intermediary
- type JITAdressVerificationMode
- type JITCreatedPayload
- type JITFailedPayload
- type JITProvisioning
- type JITSettings
- type JITUpdatedPayload
- type JITUser
- type JITUserAddress
- type JITUserIdentifier
- type JWSPayloadSettings
- type JwtClaims
- type KeyDescriptor
- type KeyInfo
- type KeysResponse
- type LegalEntity
- type License
- type LocalizedName
- type LocalizedURI
- type LoginFailedPayload
- type LoginPayload
- type MFAAuth
- type MFAMethod
- type MFAMethodResponse
- type MFAMethods
- type MFASettings
- type Mapping
- type MappingMode
- type Mappings
- type Metadata
- type Name
- type NameID
- type NameIDFormat
- type OBBRConfiguration
- type OBBRIndustry
- type OBBRMetadata
- type OIDCCredentials
- type OIDCIDP
- type OIDCServerConsent
- type OIDCSettings
- type OTPConfiguration
- type OTPPayload
- type OktaCredentials
- type OktaIDP
- type OktaSettings
- type OktaSupervisorClient
- type OpenbankingServerConsent
- func (m *OpenbankingServerConsent) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *OpenbankingServerConsent) MarshalBinary() ([]byte, error)
- func (m *OpenbankingServerConsent) UnmarshalBinary(b []byte) error
- func (m *OpenbankingServerConsent) Validate(formats strfmt.Registry) error
- type Org
- type Organization
- type OrganizationConfiguration
- func (m *OrganizationConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *OrganizationConfiguration) MarshalBinary() ([]byte, error)
- func (m *OrganizationConfiguration) UnmarshalBinary(b []byte) error
- func (m *OrganizationConfiguration) Validate(formats strfmt.Registry) error
- type OrganizationIDP
- type OrganizationMetadata
- type OrganizationResponse
- type OrganizationsResponse
- type PDPDescriptor
- type PIICategory
- type PayloadSettings
- type PersonalDetails
- type Policies
- type Policy
- type PolicyEvaluatedPayload
- func (m *PolicyEvaluatedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *PolicyEvaluatedPayload) MarshalBinary() ([]byte, error)
- func (m *PolicyEvaluatedPayload) UnmarshalBinary(b []byte) error
- func (m *PolicyEvaluatedPayload) Validate(formats strfmt.Registry) error
- type PolicyExecutionPoint
- type PolicyExecutionPoints
- type PolicyPayload
- type PolicyValidationFailure
- func (m *PolicyValidationFailure) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *PolicyValidationFailure) MarshalBinary() ([]byte, error)
- func (m *PolicyValidationFailure) UnmarshalBinary(b []byte) error
- func (m *PolicyValidationFailure) Validate(formats strfmt.Registry) error
- type PolicyValidationRecovery
- func (m *PolicyValidationRecovery) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *PolicyValidationRecovery) MarshalBinary() ([]byte, error)
- func (m *PolicyValidationRecovery) UnmarshalBinary(b []byte) error
- func (m *PolicyValidationRecovery) Validate(formats strfmt.Registry) error
- type PolicyValidationResult
- func (m *PolicyValidationResult) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *PolicyValidationResult) MarshalBinary() ([]byte, error)
- func (m *PolicyValidationResult) UnmarshalBinary(b []byte) error
- func (m *PolicyValidationResult) Validate(formats strfmt.Registry) error
- type PoolAuditPayload
- type PrivacyLedgerEvent
- type PrivacyLedgerEventType
- type PrivacyLedgerEvents
- type PrivacyLedgerPayload
- type PrivateKeyJWTCredentials
- func (m *PrivateKeyJWTCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *PrivateKeyJWTCredentials) MarshalBinary() ([]byte, error)
- func (m *PrivateKeyJWTCredentials) UnmarshalBinary(b []byte) error
- func (m *PrivateKeyJWTCredentials) Validate(formats strfmt.Registry) error
- type ProtectedType
- type ProvisioningMode
- type Purpose
- type RecentActivities
- type RecentActivity
- type RecentActivityPayload
- type RecoveryConfig
- type RecoveryPayload
- type RedirectURIs
- type RegistrationToken
- type RegistryReference
- type RemoveServiceConfigurationResult
- func (m *RemoveServiceConfigurationResult) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *RemoveServiceConfigurationResult) MarshalBinary() ([]byte, error)
- func (m *RemoveServiceConfigurationResult) UnmarshalBinary(b []byte) error
- func (m *RemoveServiceConfigurationResult) Validate(formats strfmt.Registry) error
- type RequestValidatedData
- type RequestValidatedPayload
- func (m *RequestValidatedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *RequestValidatedPayload) MarshalBinary() ([]byte, error)
- func (m *RequestValidatedPayload) UnmarshalBinary(b []byte) error
- func (m *RequestValidatedPayload) Validate(formats strfmt.Registry) error
- type RequestedAttribute
- type ResponseModes
- type ResponseTypes
- type RevocationChannel
- type RevocationReason
- type RevokeIdentityPoolRoleRequest
- func (m *RevokeIdentityPoolRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *RevokeIdentityPoolRoleRequest) MarshalBinary() ([]byte, error)
- func (m *RevokeIdentityPoolRoleRequest) UnmarshalBinary(b []byte) error
- func (m *RevokeIdentityPoolRoleRequest) Validate(formats strfmt.Registry) error
- type RevokeTenantRoleRequest
- func (m *RevokeTenantRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *RevokeTenantRoleRequest) MarshalBinary() ([]byte, error)
- func (m *RevokeTenantRoleRequest) UnmarshalBinary(b []byte) error
- func (m *RevokeTenantRoleRequest) Validate(formats strfmt.Registry) error
- type RevokeTokenRequest
- type RevokeTokensByPoolRequest
- func (m *RevokeTokensByPoolRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *RevokeTokensByPoolRequest) MarshalBinary() ([]byte, error)
- func (m *RevokeTokensByPoolRequest) UnmarshalBinary(b []byte) error
- func (m *RevokeTokensByPoolRequest) Validate(formats strfmt.Registry) error
- type RevokeWorkspaceRoleRequest
- func (m *RevokeWorkspaceRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *RevokeWorkspaceRoleRequest) MarshalBinary() ([]byte, error)
- func (m *RevokeWorkspaceRoleRequest) UnmarshalBinary(b []byte) error
- func (m *RevokeWorkspaceRoleRequest) Validate(formats strfmt.Registry) error
- type Rfc6902PatchOperation
- type Rfc6902PatchOperations
- type RiskContext
- type RiskID
- type RiskLOA
- type RoleDescriptor
- type RoleGrantAuditPayload
- type RoleResource
- type RoleResources
- type RoleSubject
- type RotateClientSecretResponse
- func (m *RotateClientSecretResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *RotateClientSecretResponse) MarshalBinary() ([]byte, error)
- func (m *RotateClientSecretResponse) UnmarshalBinary(b []byte) error
- func (m *RotateClientSecretResponse) Validate(formats strfmt.Registry) error
- type SAMLClientMetadataResponse
- func (m *SAMLClientMetadataResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *SAMLClientMetadataResponse) MarshalBinary() ([]byte, error)
- func (m *SAMLClientMetadataResponse) UnmarshalBinary(b []byte) error
- func (m *SAMLClientMetadataResponse) Validate(formats strfmt.Registry) error
- type SAMLConfiguration
- type SAMLCredentials
- type SAMLIDP
- type SAMLSettings
- type SAMLV2Credentials
- type SAMLV2IDP
- type SAMLV2Settings
- type SMSAuth
- type SMSSettings
- type SPSSODescriptor
- type SSOConfiguration
- type SameSite
- type SchemaAuditPayload
- type Scope
- type ScopeClaimFormat
- type ScopeGrant
- type ScopePrivacyInformation
- func (m *ScopePrivacyInformation) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ScopePrivacyInformation) MarshalBinary() ([]byte, error)
- func (m *ScopePrivacyInformation) UnmarshalBinary(b []byte) error
- func (m *ScopePrivacyInformation) Validate(formats strfmt.Registry) error
- type ScopeWithService
- type ScopeWithServiceID
- type ScopesGrantedPayload
- type ScopesWithServices
- type Script
- type ScriptDebug
- type ScriptDebugs
- type ScriptExecutionAuditPayload
- func (m *ScriptExecutionAuditPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ScriptExecutionAuditPayload) MarshalBinary() ([]byte, error)
- func (m *ScriptExecutionAuditPayload) UnmarshalBinary(b []byte) error
- func (m *ScriptExecutionAuditPayload) Validate(formats strfmt.Registry) error
- type ScriptExecutionPoint
- type ScriptExecutionPoints
- type ScriptExecutionResult
- type ScriptRuntime
- type Scripts
- type Secret
- type SecretsResponse
- type SecureOptions
- type Server
- type ServerAPIs
- type ServerAuditPayload
- type ServerBindingResponse
- type ServerConsent
- type ServerConsentResponse
- type ServerInfo
- type ServerJWK
- type ServerJWKs
- type ServerMetadata
- type ServerResponse
- type ServerSettings
- type ServerToServer
- type ServerToTheme
- type ServersBindingsResponse
- func (m *ServersBindingsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ServersBindingsResponse) MarshalBinary() ([]byte, error)
- func (m *ServersBindingsResponse) UnmarshalBinary(b []byte) error
- func (m *ServersBindingsResponse) Validate(formats strfmt.Registry) error
- type ServersResponse
- type Service
- type ServiceAuditPayload
- type ServiceResponse
- type ServiceWithAudience
- type ServiceWithScopesResponse
- func (m *ServiceWithScopesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ServiceWithScopesResponse) MarshalBinary() ([]byte, error)
- func (m *ServiceWithScopesResponse) UnmarshalBinary(b []byte) error
- func (m *ServiceWithScopesResponse) Validate(formats strfmt.Registry) error
- type ServicesResponse
- type SetBetaFeature
- type SpecVersion
- type StaticCredentials
- type StaticIDP
- type StaticSettings
- type StaticUser
- type Styling
- type StylingColors
- type SupportedJSONSchema
- type SystemAPIBindings
- type SystemServicesResponse
- func (m *SystemServicesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *SystemServicesResponse) MarshalBinary() ([]byte, error)
- func (m *SystemServicesResponse) UnmarshalBinary(b []byte) error
- func (m *SystemServicesResponse) Validate(formats strfmt.Registry) error
- type TaskAuditPayload
- type Template
- type TemplatePaths
- type Tenant
- type TenantMetadata
- type TenantPayload
- type TenantPermissionsResponse
- func (m *TenantPermissionsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *TenantPermissionsResponse) MarshalBinary() ([]byte, error)
- func (m *TenantPermissionsResponse) UnmarshalBinary(b []byte) error
- func (m *TenantPermissionsResponse) Validate(formats strfmt.Registry) error
- type TenantRoleSubject
- type TenantRoles
- type TenantRolesResponse
- type TenantSettings
- type TestAPIResult
- type TestMFAMethodRequest
- type TestPolicyDefinition
- type TestPolicyInput
- type TestPolicyInputRequest
- func (m *TestPolicyInputRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *TestPolicyInputRequest) MarshalBinary() ([]byte, error)
- func (m *TestPolicyInputRequest) UnmarshalBinary(b []byte) error
- func (m *TestPolicyInputRequest) Validate(formats strfmt.Registry) error
- type TestPolicyRequest
- type TestPolicyResponse
- type TestRequest
- type TestScriptRequest
- type Theme
- type Themes
- type Token
- type TokenTTLs
- type TokensRevokedPayload
- type TrustAnchorConfiguration
- func (m *TrustAnchorConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *TrustAnchorConfiguration) MarshalBinary() ([]byte, error)
- func (m *TrustAnchorConfiguration) UnmarshalBinary(b []byte) error
- func (m *TrustAnchorConfiguration) Validate(formats strfmt.Registry) error
- type UKConsentPayload
- type UnbindSystemAPIRequest
- func (m *UnbindSystemAPIRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *UnbindSystemAPIRequest) MarshalBinary() ([]byte, error)
- func (m *UnbindSystemAPIRequest) UnmarshalBinary(b []byte) error
- func (m *UnbindSystemAPIRequest) Validate(formats strfmt.Registry) error
- type UpdateAPIRequest
- type UpdateClientAdminRequest
- func (m *UpdateClientAdminRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *UpdateClientAdminRequest) MarshalBinary() ([]byte, error)
- func (m *UpdateClientAdminRequest) UnmarshalBinary(b []byte) error
- func (m *UpdateClientAdminRequest) Validate(formats strfmt.Registry) error
- type UpdateGatewayRequest
- type UserAttributeMapping
- type UserAttributesMapping
- type UserAuthenticatedPayload
- func (m *UserAuthenticatedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *UserAuthenticatedPayload) MarshalBinary() ([]byte, error)
- func (m *UserAuthenticatedPayload) UnmarshalBinary(b []byte) error
- func (m *UserAuthenticatedPayload) Validate(formats strfmt.Registry) error
- type UserCodeCharacterSet
- type UserIDAndIdentifierPayload
- func (m *UserIDAndIdentifierPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *UserIDAndIdentifierPayload) MarshalBinary() ([]byte, error)
- func (m *UserIDAndIdentifierPayload) UnmarshalBinary(b []byte) error
- func (m *UserIDAndIdentifierPayload) Validate(formats strfmt.Registry) error
- type UserOrganizationsResponse
- func (m *UserOrganizationsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *UserOrganizationsResponse) MarshalBinary() ([]byte, error)
- func (m *UserOrganizationsResponse) UnmarshalBinary(b []byte) error
- func (m *UserOrganizationsResponse) Validate(formats strfmt.Registry) error
- type UserPayload
- type UserWorkspacesResponse
- func (m *UserWorkspacesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *UserWorkspacesResponse) MarshalBinary() ([]byte, error)
- func (m *UserWorkspacesResponse) UnmarshalBinary(b []byte) error
- func (m *UserWorkspacesResponse) Validate(formats strfmt.Registry) error
- type ValidateResponseValidatorFailure
- func (m *ValidateResponseValidatorFailure) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *ValidateResponseValidatorFailure) MarshalBinary() ([]byte, error)
- func (m *ValidateResponseValidatorFailure) UnmarshalBinary(b []byte) error
- func (m *ValidateResponseValidatorFailure) Validate(formats strfmt.Registry) error
- type ValidatorConfig
- type VanityDomain
- type VanityDomainType
- type Webhook
- type WebhookOnCreateResponse
- func (m *WebhookOnCreateResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *WebhookOnCreateResponse) MarshalBinary() ([]byte, error)
- func (m *WebhookOnCreateResponse) UnmarshalBinary(b []byte) error
- func (m *WebhookOnCreateResponse) Validate(formats strfmt.Registry) error
- type WebhookResponse
- type WebhooksResponse
- type WorkspaceIDP
- type WorkspaceMetadata
- type WorkspacePermissionsResponse
- func (m *WorkspacePermissionsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *WorkspacePermissionsResponse) MarshalBinary() ([]byte, error)
- func (m *WorkspacePermissionsResponse) UnmarshalBinary(b []byte) error
- func (m *WorkspacePermissionsResponse) Validate(formats strfmt.Registry) error
- type WorkspaceResponse
- type WorkspaceRoleSubject
- type WorkspaceRoles
- type WorkspaceRolesResponse
- func (m *WorkspaceRolesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
- func (m *WorkspaceRolesResponse) MarshalBinary() ([]byte, error)
- func (m *WorkspaceRolesResponse) UnmarshalBinary(b []byte) error
- func (m *WorkspaceRolesResponse) Validate(formats strfmt.Registry) error
- type WorkspacesResponse
- type X509Certificate
- type X509Data
Constants ¶
const ( // AccessRequestDataTokenEndpointAuthnMethodClientSecretBasic captures enum value "client_secret_basic" AccessRequestDataTokenEndpointAuthnMethodClientSecretBasic string = "client_secret_basic" // AccessRequestDataTokenEndpointAuthnMethodClientSecretPost captures enum value "client_secret_post" AccessRequestDataTokenEndpointAuthnMethodClientSecretPost string = "client_secret_post" // AccessRequestDataTokenEndpointAuthnMethodClientSecretJwt captures enum value "client_secret_jwt" AccessRequestDataTokenEndpointAuthnMethodClientSecretJwt string = "client_secret_jwt" // AccessRequestDataTokenEndpointAuthnMethodPrivateKeyJwt captures enum value "private_key_jwt" AccessRequestDataTokenEndpointAuthnMethodPrivateKeyJwt string = "private_key_jwt" // AccessRequestDataTokenEndpointAuthnMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" AccessRequestDataTokenEndpointAuthnMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // AccessRequestDataTokenEndpointAuthnMethodTLSClientAuth captures enum value "tls_client_auth" AccessRequestDataTokenEndpointAuthnMethodTLSClientAuth string = "tls_client_auth" // AccessRequestDataTokenEndpointAuthnMethodNone captures enum value "none" AccessRequestDataTokenEndpointAuthnMethodNone string = "none" // AccessRequestDataTokenEndpointAuthnMethodUnspecified captures enum value "unspecified" AccessRequestDataTokenEndpointAuthnMethodUnspecified string = "unspecified" )
const ( // AccessRequestDataWithErrorTokenEndpointAuthnMethodClientSecretBasic captures enum value "client_secret_basic" AccessRequestDataWithErrorTokenEndpointAuthnMethodClientSecretBasic string = "client_secret_basic" // AccessRequestDataWithErrorTokenEndpointAuthnMethodClientSecretPost captures enum value "client_secret_post" AccessRequestDataWithErrorTokenEndpointAuthnMethodClientSecretPost string = "client_secret_post" // AccessRequestDataWithErrorTokenEndpointAuthnMethodClientSecretJwt captures enum value "client_secret_jwt" AccessRequestDataWithErrorTokenEndpointAuthnMethodClientSecretJwt string = "client_secret_jwt" // AccessRequestDataWithErrorTokenEndpointAuthnMethodPrivateKeyJwt captures enum value "private_key_jwt" AccessRequestDataWithErrorTokenEndpointAuthnMethodPrivateKeyJwt string = "private_key_jwt" // AccessRequestDataWithErrorTokenEndpointAuthnMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" AccessRequestDataWithErrorTokenEndpointAuthnMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // AccessRequestDataWithErrorTokenEndpointAuthnMethodTLSClientAuth captures enum value "tls_client_auth" AccessRequestDataWithErrorTokenEndpointAuthnMethodTLSClientAuth string = "tls_client_auth" // AccessRequestDataWithErrorTokenEndpointAuthnMethodNone captures enum value "none" AccessRequestDataWithErrorTokenEndpointAuthnMethodNone string = "none" // AccessRequestDataWithErrorTokenEndpointAuthnMethodUnspecified captures enum value "unspecified" AccessRequestDataWithErrorTokenEndpointAuthnMethodUnspecified string = "unspecified" )
const ( // APIAPITypeRest captures enum value "rest" APIAPITypeRest string = "rest" // APIAPITypeGraphql captures enum value "graphql" APIAPITypeGraphql string = "graphql" )
const ( // AuditEventActionAuthenticated captures enum value "authenticated" AuditEventActionAuthenticated string = "authenticated" // AuditEventActionChallenged captures enum value "challenged" AuditEventActionChallenged string = "challenged" // AuditEventActionAuthorized captures enum value "authorized" AuditEventActionAuthorized string = "authorized" AuditEventActionUnauthorized string = "unauthorized" // AuditEventActionCreated captures enum value "created" AuditEventActionCreated string = "created" // AuditEventActionUpdated captures enum value "updated" AuditEventActionUpdated string = "updated" // AuditEventActionDeleted captures enum value "deleted" AuditEventActionDeleted string = "deleted" // AuditEventActionGenerated captures enum value "generated" AuditEventActionGenerated string = "generated" // AuditEventActionRequested captures enum value "requested" AuditEventActionRequested string = "requested" // AuditEventActionConfirmed captures enum value "confirmed" AuditEventActionConfirmed string = "confirmed" // AuditEventActionAccepted captures enum value "accepted" AuditEventActionAccepted string = "accepted" // AuditEventActionRejected captures enum value "rejected" AuditEventActionRejected string = "rejected" // AuditEventActionRevoked captures enum value "revoked" AuditEventActionRevoked string = "revoked" // AuditEventActionNotified captures enum value "notified" AuditEventActionNotified string = "notified" // AuditEventActionIssued captures enum value "issued" AuditEventActionIssued string = "issued" // AuditEventActionDenied captures enum value "denied" AuditEventActionDenied string = "denied" // AuditEventActionGranted captures enum value "granted" AuditEventActionGranted string = "granted" // AuditEventActionAttempted captures enum value "attempted" AuditEventActionAttempted string = "attempted" // AuditEventActionFailed captures enum value "failed" AuditEventActionFailed string = "failed" // AuditEventActionSucceeded captures enum value "succeeded" AuditEventActionSucceeded string = "succeeded" // AuditEventActionSent captures enum value "sent" AuditEventActionSent string = "sent" // AuditEventActionNotSent captures enum value "not_sent" AuditEventActionNotSent string = "not_sent" // AuditEventActionExecuted captures enum value "executed" AuditEventActionExecuted string = "executed" // AuditEventActionResetRequested captures enum value "reset_requested" AuditEventActionResetRequested string = "reset_requested" // AuditEventActionResetCompleted captures enum value "reset_completed" AuditEventActionResetCompleted string = "reset_completed" // AuditEventActionAddRequested captures enum value "add_requested" AuditEventActionAddRequested string = "add_requested" // AuditEventActionAddCompleted captures enum value "add_completed" AuditEventActionAddCompleted string = "add_completed" )
const ( // AuditEventEventSubjectRequest captures enum value "request" AuditEventEventSubjectRequest string = "request" // AuditEventEventSubjectGatewayRequest captures enum value "gateway_request" AuditEventEventSubjectGatewayRequest string = "gateway_request" // AuditEventEventSubjectGatewayPolicy captures enum value "gateway_policy" AuditEventEventSubjectGatewayPolicy string = "gateway_policy" // AuditEventEventSubjectPolicy captures enum value "policy" AuditEventEventSubjectPolicy string = "policy" // AuditEventEventSubjectClient captures enum value "client" AuditEventEventSubjectClient string = "client" // AuditEventEventSubjectCredential captures enum value "credential" AuditEventEventSubjectCredential string = "credential" // AuditEventEventSubjectLogin captures enum value "login" AuditEventEventSubjectLogin string = "login" // AuditEventEventSubjectPostAuthn captures enum value "post_authn" AuditEventEventSubjectPostAuthn string = "post_authn" // AuditEventEventSubjectRecovery captures enum value "recovery" AuditEventEventSubjectRecovery string = "recovery" // AuditEventEventSubjectConsent captures enum value "consent" AuditEventEventSubjectConsent string = "consent" // AuditEventEventSubjectClientConsents captures enum value "client_consents" AuditEventEventSubjectClientConsents string = "client_consents" // AuditEventEventSubjectCustomerConsents captures enum value "customer_consents" AuditEventEventSubjectCustomerConsents string = "customer_consents" // AuditEventEventSubjectAuthorizationCode captures enum value "authorization_code" AuditEventEventSubjectAuthorizationCode string = "authorization_code" // AuditEventEventSubjectAccessToken captures enum value "access_token" AuditEventEventSubjectAccessToken string = "access_token" // AuditEventEventSubjectSamlAssertion captures enum value "saml_assertion" AuditEventEventSubjectSamlAssertion string = "saml_assertion" // AuditEventEventSubjectScopes captures enum value "scopes" AuditEventEventSubjectScopes string = "scopes" // AuditEventEventSubjectClaims captures enum value "claims" AuditEventEventSubjectClaims string = "claims" // AuditEventEventSubjectOtp captures enum value "otp" AuditEventEventSubjectOtp string = "otp" // AuditEventEventSubjectUser captures enum value "user" AuditEventEventSubjectUser string = "user" // AuditEventEventSubjectSchema captures enum value "schema" AuditEventEventSubjectSchema string = "schema" // AuditEventEventSubjectPool captures enum value "pool" AuditEventEventSubjectPool string = "pool" // AuditEventEventSubjectPassword captures enum value "password" AuditEventEventSubjectPassword string = "password" // AuditEventEventSubjectBruteforce captures enum value "bruteforce" AuditEventEventSubjectBruteforce string = "bruteforce" // AuditEventEventSubjectDcr captures enum value "dcr" AuditEventEventSubjectDcr string = "dcr" // AuditEventEventSubjectScript captures enum value "script" AuditEventEventSubjectScript string = "script" // AuditEventEventSubjectRole captures enum value "role" AuditEventEventSubjectRole string = "role" // AuditEventEventSubjectTask captures enum value "task" AuditEventEventSubjectTask string = "task" // AuditEventEventSubjectJit captures enum value "jit" AuditEventEventSubjectJit string = "jit" // AuditEventEventSubjectTokens captures enum value "tokens" AuditEventEventSubjectTokens string = "tokens" // AuditEventEventSubjectService captures enum value "service" AuditEventEventSubjectService string = "service" // AuditEventEventSubjectServer captures enum value "server" AuditEventEventSubjectServer string = "server" // AuditEventEventSubjectImport captures enum value "import" AuditEventEventSubjectImport string = "import" // AuditEventEventSubjectOrganization captures enum value "organization" AuditEventEventSubjectOrganization string = "organization" // AuditEventEventSubjectOtpInspect captures enum value "otp_inspect" AuditEventEventSubjectOtpInspect string = "otp_inspect" // AuditEventEventSubjectTotp captures enum value "totp" AuditEventEventSubjectTotp string = "totp" // AuditEventEventSubjectWebauthn captures enum value "webauthn" AuditEventEventSubjectWebauthn string = "webauthn" )
const ( // CDRArrangementSharingTypeOneTime captures enum value "one_time" CDRArrangementSharingTypeOneTime string = "one_time" // CDRArrangementSharingTypeOneTimeWithRefreshToken captures enum value "one_time_with_refresh_token" CDRArrangementSharingTypeOneTimeWithRefreshToken string = "one_time_with_refresh_token" // CDRArrangementSharingTypeReusable captures enum value "reusable" CDRArrangementSharingTypeReusable string = "reusable" )
const ( // ClientAuthorizationEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP" ClientAuthorizationEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP" // ClientAuthorizationEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" ClientAuthorizationEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // ClientAuthorizationEncryptedResponseEncA256GCM captures enum value "A256GCM" ClientAuthorizationEncryptedResponseEncA256GCM string = "A256GCM" // ClientAuthorizationEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256" ClientAuthorizationEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // ClientClientStatusActive captures enum value "active" ClientClientStatusActive string = "active" // ClientClientStatusInactive captures enum value "inactive" ClientClientStatusInactive string = "inactive" )
const ( // ClientClientTypeOauth2 captures enum value "oauth2" ClientClientTypeOauth2 string = "oauth2" // ClientClientTypeSaml captures enum value "saml" ClientClientTypeSaml string = "saml" )
const ( // ClientIDTokenEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP" ClientIDTokenEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP" // ClientIDTokenEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" ClientIDTokenEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // ClientIDTokenEncryptedResponseEncA256GCM captures enum value "A256GCM" ClientIDTokenEncryptedResponseEncA256GCM string = "A256GCM" // ClientIDTokenEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256" ClientIDTokenEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // ClientIDTokenSignedResponseAlgRS256 captures enum value "RS256" ClientIDTokenSignedResponseAlgRS256 string = "RS256" // ClientIDTokenSignedResponseAlgES256 captures enum value "ES256" ClientIDTokenSignedResponseAlgES256 string = "ES256" // ClientIDTokenSignedResponseAlgPS256 captures enum value "PS256" ClientIDTokenSignedResponseAlgPS256 string = "PS256" )
const ( // ClientIntrospectionEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" ClientIntrospectionEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // ClientIntrospectionEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" ClientIntrospectionEndpointAuthMethodClientSecretPost string = "client_secret_post" // ClientIntrospectionEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" ClientIntrospectionEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // ClientIntrospectionEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" ClientIntrospectionEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // ClientIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" ClientIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // ClientIntrospectionEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" ClientIntrospectionEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // ClientIntrospectionEndpointAuthMethodNone captures enum value "none" ClientIntrospectionEndpointAuthMethodNone string = "none" )
const ( // ClientRequestObjectEncryptionAlgRSADashOAEP captures enum value "RSA-OAEP" ClientRequestObjectEncryptionAlgRSADashOAEP string = "RSA-OAEP" // ClientRequestObjectEncryptionAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" ClientRequestObjectEncryptionAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // ClientRequestObjectEncryptionEncA256GCM captures enum value "A256GCM" ClientRequestObjectEncryptionEncA256GCM string = "A256GCM" // ClientRequestObjectEncryptionEncA128CBCDashHS256 captures enum value "A128CBC-HS256" ClientRequestObjectEncryptionEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // ClientRequestObjectSigningAlgAny captures enum value "any" ClientRequestObjectSigningAlgAny string = "any" // ClientRequestObjectSigningAlgNone captures enum value "none" ClientRequestObjectSigningAlgNone string = "none" // ClientRequestObjectSigningAlgRS256 captures enum value "RS256" ClientRequestObjectSigningAlgRS256 string = "RS256" // ClientRequestObjectSigningAlgES256 captures enum value "ES256" ClientRequestObjectSigningAlgES256 string = "ES256" // ClientRequestObjectSigningAlgPS256 captures enum value "PS256" ClientRequestObjectSigningAlgPS256 string = "PS256" )
const ( // ClientRevocationEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" ClientRevocationEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // ClientRevocationEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" ClientRevocationEndpointAuthMethodClientSecretPost string = "client_secret_post" // ClientRevocationEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" ClientRevocationEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // ClientRevocationEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" ClientRevocationEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // ClientRevocationEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" ClientRevocationEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // ClientRevocationEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" ClientRevocationEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // ClientRevocationEndpointAuthMethodNone captures enum value "none" ClientRevocationEndpointAuthMethodNone string = "none" )
const ( // ClientSubjectTypePublic captures enum value "public" ClientSubjectTypePublic string = "public" // ClientSubjectTypePairwise captures enum value "pairwise" ClientSubjectTypePairwise string = "pairwise" )
const ( // ClientTokenEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" ClientTokenEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // ClientTokenEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" ClientTokenEndpointAuthMethodClientSecretPost string = "client_secret_post" // ClientTokenEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" ClientTokenEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // ClientTokenEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" ClientTokenEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // ClientTokenEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" ClientTokenEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // ClientTokenEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" ClientTokenEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // ClientTokenEndpointAuthMethodNone captures enum value "none" ClientTokenEndpointAuthMethodNone string = "none" // ClientTokenEndpointAuthMethodUnspecified captures enum value "unspecified" ClientTokenEndpointAuthMethodUnspecified string = "unspecified" )
const ( // ClientTokenEndpointAuthSigningAlgRS256 captures enum value "RS256" ClientTokenEndpointAuthSigningAlgRS256 string = "RS256" // ClientTokenEndpointAuthSigningAlgES256 captures enum value "ES256" ClientTokenEndpointAuthSigningAlgES256 string = "ES256" // ClientTokenEndpointAuthSigningAlgPS256 captures enum value "PS256" ClientTokenEndpointAuthSigningAlgPS256 string = "PS256" // ClientTokenEndpointAuthSigningAlgHS256 captures enum value "HS256" ClientTokenEndpointAuthSigningAlgHS256 string = "HS256" // ClientTokenEndpointAuthSigningAlgEmpty captures enum value "" ClientTokenEndpointAuthSigningAlgEmpty string = "" )
const ( // ClientUserinfoSignedResponseAlgNone captures enum value "none" ClientUserinfoSignedResponseAlgNone string = "none" // ClientUserinfoSignedResponseAlgRS256 captures enum value "RS256" ClientUserinfoSignedResponseAlgRS256 string = "RS256" // ClientUserinfoSignedResponseAlgES256 captures enum value "ES256" ClientUserinfoSignedResponseAlgES256 string = "ES256" )
const ( // ClientAdminResponseAuthorizationEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP" ClientAdminResponseAuthorizationEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP" // ClientAdminResponseAuthorizationEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" ClientAdminResponseAuthorizationEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // ClientAdminResponseAuthorizationEncryptedResponseEncA256GCM captures enum value "A256GCM" ClientAdminResponseAuthorizationEncryptedResponseEncA256GCM string = "A256GCM" // ClientAdminResponseAuthorizationEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256" ClientAdminResponseAuthorizationEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // ClientAdminResponseClientStatusActive captures enum value "active" ClientAdminResponseClientStatusActive string = "active" // ClientAdminResponseClientStatusInactive captures enum value "inactive" ClientAdminResponseClientStatusInactive string = "inactive" )
const ( // ClientAdminResponseClientTypeOauth2 captures enum value "oauth2" ClientAdminResponseClientTypeOauth2 string = "oauth2" // ClientAdminResponseClientTypeSaml captures enum value "saml" ClientAdminResponseClientTypeSaml string = "saml" )
const ( // ClientAdminResponseIDTokenEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP" ClientAdminResponseIDTokenEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP" // ClientAdminResponseIDTokenEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" ClientAdminResponseIDTokenEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // ClientAdminResponseIDTokenEncryptedResponseEncA256GCM captures enum value "A256GCM" ClientAdminResponseIDTokenEncryptedResponseEncA256GCM string = "A256GCM" // ClientAdminResponseIDTokenEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256" ClientAdminResponseIDTokenEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // ClientAdminResponseIDTokenSignedResponseAlgRS256 captures enum value "RS256" ClientAdminResponseIDTokenSignedResponseAlgRS256 string = "RS256" // ClientAdminResponseIDTokenSignedResponseAlgES256 captures enum value "ES256" ClientAdminResponseIDTokenSignedResponseAlgES256 string = "ES256" // ClientAdminResponseIDTokenSignedResponseAlgPS256 captures enum value "PS256" ClientAdminResponseIDTokenSignedResponseAlgPS256 string = "PS256" )
const ( // ClientAdminResponseIntrospectionEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" ClientAdminResponseIntrospectionEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // ClientAdminResponseIntrospectionEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" ClientAdminResponseIntrospectionEndpointAuthMethodClientSecretPost string = "client_secret_post" // ClientAdminResponseIntrospectionEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" ClientAdminResponseIntrospectionEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // ClientAdminResponseIntrospectionEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" ClientAdminResponseIntrospectionEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // ClientAdminResponseIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" ClientAdminResponseIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // ClientAdminResponseIntrospectionEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" ClientAdminResponseIntrospectionEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // ClientAdminResponseIntrospectionEndpointAuthMethodNone captures enum value "none" ClientAdminResponseIntrospectionEndpointAuthMethodNone string = "none" )
const ( // ClientAdminResponseRequestObjectEncryptionAlgRSADashOAEP captures enum value "RSA-OAEP" ClientAdminResponseRequestObjectEncryptionAlgRSADashOAEP string = "RSA-OAEP" // ClientAdminResponseRequestObjectEncryptionAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" ClientAdminResponseRequestObjectEncryptionAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // ClientAdminResponseRequestObjectEncryptionEncA256GCM captures enum value "A256GCM" ClientAdminResponseRequestObjectEncryptionEncA256GCM string = "A256GCM" // ClientAdminResponseRequestObjectEncryptionEncA128CBCDashHS256 captures enum value "A128CBC-HS256" ClientAdminResponseRequestObjectEncryptionEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // ClientAdminResponseRequestObjectSigningAlgAny captures enum value "any" ClientAdminResponseRequestObjectSigningAlgAny string = "any" // ClientAdminResponseRequestObjectSigningAlgNone captures enum value "none" ClientAdminResponseRequestObjectSigningAlgNone string = "none" // ClientAdminResponseRequestObjectSigningAlgRS256 captures enum value "RS256" ClientAdminResponseRequestObjectSigningAlgRS256 string = "RS256" // ClientAdminResponseRequestObjectSigningAlgES256 captures enum value "ES256" ClientAdminResponseRequestObjectSigningAlgES256 string = "ES256" // ClientAdminResponseRequestObjectSigningAlgPS256 captures enum value "PS256" ClientAdminResponseRequestObjectSigningAlgPS256 string = "PS256" )
const ( // ClientAdminResponseRevocationEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" ClientAdminResponseRevocationEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // ClientAdminResponseRevocationEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" ClientAdminResponseRevocationEndpointAuthMethodClientSecretPost string = "client_secret_post" // ClientAdminResponseRevocationEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" ClientAdminResponseRevocationEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // ClientAdminResponseRevocationEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" ClientAdminResponseRevocationEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // ClientAdminResponseRevocationEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" ClientAdminResponseRevocationEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // ClientAdminResponseRevocationEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" ClientAdminResponseRevocationEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // ClientAdminResponseRevocationEndpointAuthMethodNone captures enum value "none" ClientAdminResponseRevocationEndpointAuthMethodNone string = "none" )
const ( // ClientAdminResponseSubjectTypePublic captures enum value "public" ClientAdminResponseSubjectTypePublic string = "public" // ClientAdminResponseSubjectTypePairwise captures enum value "pairwise" ClientAdminResponseSubjectTypePairwise string = "pairwise" )
const ( // ClientAdminResponseTokenEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" ClientAdminResponseTokenEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // ClientAdminResponseTokenEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" ClientAdminResponseTokenEndpointAuthMethodClientSecretPost string = "client_secret_post" // ClientAdminResponseTokenEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" ClientAdminResponseTokenEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // ClientAdminResponseTokenEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" ClientAdminResponseTokenEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // ClientAdminResponseTokenEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" ClientAdminResponseTokenEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // ClientAdminResponseTokenEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" ClientAdminResponseTokenEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // ClientAdminResponseTokenEndpointAuthMethodNone captures enum value "none" ClientAdminResponseTokenEndpointAuthMethodNone string = "none" // ClientAdminResponseTokenEndpointAuthMethodUnspecified captures enum value "unspecified" ClientAdminResponseTokenEndpointAuthMethodUnspecified string = "unspecified" )
const ( // ClientAdminResponseTokenEndpointAuthSigningAlgRS256 captures enum value "RS256" ClientAdminResponseTokenEndpointAuthSigningAlgRS256 string = "RS256" // ClientAdminResponseTokenEndpointAuthSigningAlgES256 captures enum value "ES256" ClientAdminResponseTokenEndpointAuthSigningAlgES256 string = "ES256" // ClientAdminResponseTokenEndpointAuthSigningAlgPS256 captures enum value "PS256" ClientAdminResponseTokenEndpointAuthSigningAlgPS256 string = "PS256" // ClientAdminResponseTokenEndpointAuthSigningAlgHS256 captures enum value "HS256" ClientAdminResponseTokenEndpointAuthSigningAlgHS256 string = "HS256" // ClientAdminResponseTokenEndpointAuthSigningAlgEmpty captures enum value "" ClientAdminResponseTokenEndpointAuthSigningAlgEmpty string = "" )
const ( // ClientAdminResponseUserinfoSignedResponseAlgNone captures enum value "none" ClientAdminResponseUserinfoSignedResponseAlgNone string = "none" // ClientAdminResponseUserinfoSignedResponseAlgRS256 captures enum value "RS256" ClientAdminResponseUserinfoSignedResponseAlgRS256 string = "RS256" // ClientAdminResponseUserinfoSignedResponseAlgES256 captures enum value "ES256" ClientAdminResponseUserinfoSignedResponseAlgES256 string = "ES256" )
const ( // ClientAuditPayloadAuthorizationEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP" ClientAuditPayloadAuthorizationEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP" // ClientAuditPayloadAuthorizationEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" ClientAuditPayloadAuthorizationEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // ClientAuditPayloadAuthorizationEncryptedResponseEncA256GCM captures enum value "A256GCM" ClientAuditPayloadAuthorizationEncryptedResponseEncA256GCM string = "A256GCM" // ClientAuditPayloadAuthorizationEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256" ClientAuditPayloadAuthorizationEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // ClientAuditPayloadClientStatusActive captures enum value "active" ClientAuditPayloadClientStatusActive string = "active" // ClientAuditPayloadClientStatusInactive captures enum value "inactive" ClientAuditPayloadClientStatusInactive string = "inactive" )
const ( // ClientAuditPayloadIDTokenEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP" ClientAuditPayloadIDTokenEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP" // ClientAuditPayloadIDTokenEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" ClientAuditPayloadIDTokenEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // ClientAuditPayloadIDTokenEncryptedResponseEncA256GCM captures enum value "A256GCM" ClientAuditPayloadIDTokenEncryptedResponseEncA256GCM string = "A256GCM" // ClientAuditPayloadIDTokenEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256" ClientAuditPayloadIDTokenEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // ClientAuditPayloadIDTokenSignedResponseAlgRS256 captures enum value "RS256" ClientAuditPayloadIDTokenSignedResponseAlgRS256 string = "RS256" // ClientAuditPayloadIDTokenSignedResponseAlgES256 captures enum value "ES256" ClientAuditPayloadIDTokenSignedResponseAlgES256 string = "ES256" // ClientAuditPayloadIDTokenSignedResponseAlgPS256 captures enum value "PS256" ClientAuditPayloadIDTokenSignedResponseAlgPS256 string = "PS256" )
const ( // ClientAuditPayloadIntrospectionEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" ClientAuditPayloadIntrospectionEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // ClientAuditPayloadIntrospectionEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" ClientAuditPayloadIntrospectionEndpointAuthMethodClientSecretPost string = "client_secret_post" // ClientAuditPayloadIntrospectionEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" ClientAuditPayloadIntrospectionEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // ClientAuditPayloadIntrospectionEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" ClientAuditPayloadIntrospectionEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // ClientAuditPayloadIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" ClientAuditPayloadIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // ClientAuditPayloadIntrospectionEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" ClientAuditPayloadIntrospectionEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // ClientAuditPayloadIntrospectionEndpointAuthMethodNone captures enum value "none" ClientAuditPayloadIntrospectionEndpointAuthMethodNone string = "none" )
const ( // ClientAuditPayloadRequestObjectEncryptionAlgRSADashOAEP captures enum value "RSA-OAEP" ClientAuditPayloadRequestObjectEncryptionAlgRSADashOAEP string = "RSA-OAEP" // ClientAuditPayloadRequestObjectEncryptionAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" ClientAuditPayloadRequestObjectEncryptionAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // ClientAuditPayloadRequestObjectEncryptionEncA256GCM captures enum value "A256GCM" ClientAuditPayloadRequestObjectEncryptionEncA256GCM string = "A256GCM" // ClientAuditPayloadRequestObjectEncryptionEncA128CBCDashHS256 captures enum value "A128CBC-HS256" ClientAuditPayloadRequestObjectEncryptionEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // ClientAuditPayloadRequestObjectSigningAlgAny captures enum value "any" ClientAuditPayloadRequestObjectSigningAlgAny string = "any" // ClientAuditPayloadRequestObjectSigningAlgNone captures enum value "none" ClientAuditPayloadRequestObjectSigningAlgNone string = "none" // ClientAuditPayloadRequestObjectSigningAlgRS256 captures enum value "RS256" ClientAuditPayloadRequestObjectSigningAlgRS256 string = "RS256" // ClientAuditPayloadRequestObjectSigningAlgES256 captures enum value "ES256" ClientAuditPayloadRequestObjectSigningAlgES256 string = "ES256" // ClientAuditPayloadRequestObjectSigningAlgPS256 captures enum value "PS256" ClientAuditPayloadRequestObjectSigningAlgPS256 string = "PS256" )
const ( // ClientAuditPayloadRevocationEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" ClientAuditPayloadRevocationEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // ClientAuditPayloadRevocationEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" ClientAuditPayloadRevocationEndpointAuthMethodClientSecretPost string = "client_secret_post" // ClientAuditPayloadRevocationEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" ClientAuditPayloadRevocationEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // ClientAuditPayloadRevocationEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" ClientAuditPayloadRevocationEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // ClientAuditPayloadRevocationEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" ClientAuditPayloadRevocationEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // ClientAuditPayloadRevocationEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" ClientAuditPayloadRevocationEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // ClientAuditPayloadRevocationEndpointAuthMethodNone captures enum value "none" ClientAuditPayloadRevocationEndpointAuthMethodNone string = "none" )
const ( // ClientAuditPayloadSubjectTypePublic captures enum value "public" ClientAuditPayloadSubjectTypePublic string = "public" // ClientAuditPayloadSubjectTypePairwise captures enum value "pairwise" ClientAuditPayloadSubjectTypePairwise string = "pairwise" )
const ( // ClientAuditPayloadTokenEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" ClientAuditPayloadTokenEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // ClientAuditPayloadTokenEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" ClientAuditPayloadTokenEndpointAuthMethodClientSecretPost string = "client_secret_post" // ClientAuditPayloadTokenEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" ClientAuditPayloadTokenEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // ClientAuditPayloadTokenEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" ClientAuditPayloadTokenEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // ClientAuditPayloadTokenEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" ClientAuditPayloadTokenEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // ClientAuditPayloadTokenEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" ClientAuditPayloadTokenEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // ClientAuditPayloadTokenEndpointAuthMethodNone captures enum value "none" ClientAuditPayloadTokenEndpointAuthMethodNone string = "none" // ClientAuditPayloadTokenEndpointAuthMethodUnspecified captures enum value "unspecified" ClientAuditPayloadTokenEndpointAuthMethodUnspecified string = "unspecified" )
const ( // ClientAuditPayloadTokenEndpointAuthSigningAlgRS256 captures enum value "RS256" ClientAuditPayloadTokenEndpointAuthSigningAlgRS256 string = "RS256" // ClientAuditPayloadTokenEndpointAuthSigningAlgES256 captures enum value "ES256" ClientAuditPayloadTokenEndpointAuthSigningAlgES256 string = "ES256" // ClientAuditPayloadTokenEndpointAuthSigningAlgPS256 captures enum value "PS256" ClientAuditPayloadTokenEndpointAuthSigningAlgPS256 string = "PS256" // ClientAuditPayloadTokenEndpointAuthSigningAlgHS256 captures enum value "HS256" ClientAuditPayloadTokenEndpointAuthSigningAlgHS256 string = "HS256" // ClientAuditPayloadTokenEndpointAuthSigningAlgEmpty captures enum value "" ClientAuditPayloadTokenEndpointAuthSigningAlgEmpty string = "" )
const ( // ClientAuditPayloadUserinfoSignedResponseAlgNone captures enum value "none" ClientAuditPayloadUserinfoSignedResponseAlgNone string = "none" // ClientAuditPayloadUserinfoSignedResponseAlgRS256 captures enum value "RS256" ClientAuditPayloadUserinfoSignedResponseAlgRS256 string = "RS256" // ClientAuditPayloadUserinfoSignedResponseAlgES256 captures enum value "ES256" ClientAuditPayloadUserinfoSignedResponseAlgES256 string = "ES256" )
const ( // CreateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP" CreateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP" // CreateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" CreateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // CreateClientAdminRequestAuthorizationEncryptedResponseEncA256GCM captures enum value "A256GCM" CreateClientAdminRequestAuthorizationEncryptedResponseEncA256GCM string = "A256GCM" // CreateClientAdminRequestAuthorizationEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256" CreateClientAdminRequestAuthorizationEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // CreateClientAdminRequestClientStatusActive captures enum value "active" CreateClientAdminRequestClientStatusActive string = "active" // CreateClientAdminRequestClientStatusInactive captures enum value "inactive" CreateClientAdminRequestClientStatusInactive string = "inactive" )
const ( // CreateClientAdminRequestClientTypeOauth2 captures enum value "oauth2" CreateClientAdminRequestClientTypeOauth2 string = "oauth2" // CreateClientAdminRequestClientTypeSaml captures enum value "saml" CreateClientAdminRequestClientTypeSaml string = "saml" )
const ( // CreateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP" CreateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP" // CreateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" CreateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // CreateClientAdminRequestIDTokenEncryptedResponseEncA256GCM captures enum value "A256GCM" CreateClientAdminRequestIDTokenEncryptedResponseEncA256GCM string = "A256GCM" // CreateClientAdminRequestIDTokenEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256" CreateClientAdminRequestIDTokenEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // CreateClientAdminRequestIDTokenSignedResponseAlgRS256 captures enum value "RS256" CreateClientAdminRequestIDTokenSignedResponseAlgRS256 string = "RS256" // CreateClientAdminRequestIDTokenSignedResponseAlgES256 captures enum value "ES256" CreateClientAdminRequestIDTokenSignedResponseAlgES256 string = "ES256" // CreateClientAdminRequestIDTokenSignedResponseAlgPS256 captures enum value "PS256" CreateClientAdminRequestIDTokenSignedResponseAlgPS256 string = "PS256" )
const ( // CreateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" CreateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // CreateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" CreateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretPost string = "client_secret_post" // CreateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" CreateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // CreateClientAdminRequestIntrospectionEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" CreateClientAdminRequestIntrospectionEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // CreateClientAdminRequestIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" CreateClientAdminRequestIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // CreateClientAdminRequestIntrospectionEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" CreateClientAdminRequestIntrospectionEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // CreateClientAdminRequestIntrospectionEndpointAuthMethodNone captures enum value "none" CreateClientAdminRequestIntrospectionEndpointAuthMethodNone string = "none" )
const ( // CreateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEP captures enum value "RSA-OAEP" CreateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEP string = "RSA-OAEP" // CreateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" CreateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // CreateClientAdminRequestRequestObjectEncryptionEncA256GCM captures enum value "A256GCM" CreateClientAdminRequestRequestObjectEncryptionEncA256GCM string = "A256GCM" // CreateClientAdminRequestRequestObjectEncryptionEncA128CBCDashHS256 captures enum value "A128CBC-HS256" CreateClientAdminRequestRequestObjectEncryptionEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // CreateClientAdminRequestRequestObjectSigningAlgAny captures enum value "any" CreateClientAdminRequestRequestObjectSigningAlgAny string = "any" // CreateClientAdminRequestRequestObjectSigningAlgNone captures enum value "none" CreateClientAdminRequestRequestObjectSigningAlgNone string = "none" // CreateClientAdminRequestRequestObjectSigningAlgRS256 captures enum value "RS256" CreateClientAdminRequestRequestObjectSigningAlgRS256 string = "RS256" // CreateClientAdminRequestRequestObjectSigningAlgES256 captures enum value "ES256" CreateClientAdminRequestRequestObjectSigningAlgES256 string = "ES256" // CreateClientAdminRequestRequestObjectSigningAlgPS256 captures enum value "PS256" CreateClientAdminRequestRequestObjectSigningAlgPS256 string = "PS256" )
const ( // CreateClientAdminRequestRevocationEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" CreateClientAdminRequestRevocationEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // CreateClientAdminRequestRevocationEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" CreateClientAdminRequestRevocationEndpointAuthMethodClientSecretPost string = "client_secret_post" // CreateClientAdminRequestRevocationEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" CreateClientAdminRequestRevocationEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // CreateClientAdminRequestRevocationEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" CreateClientAdminRequestRevocationEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // CreateClientAdminRequestRevocationEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" CreateClientAdminRequestRevocationEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // CreateClientAdminRequestRevocationEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" CreateClientAdminRequestRevocationEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // CreateClientAdminRequestRevocationEndpointAuthMethodNone captures enum value "none" CreateClientAdminRequestRevocationEndpointAuthMethodNone string = "none" )
const ( // CreateClientAdminRequestSubjectTypePublic captures enum value "public" CreateClientAdminRequestSubjectTypePublic string = "public" // CreateClientAdminRequestSubjectTypePairwise captures enum value "pairwise" CreateClientAdminRequestSubjectTypePairwise string = "pairwise" )
const ( // CreateClientAdminRequestTokenEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" CreateClientAdminRequestTokenEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // CreateClientAdminRequestTokenEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" CreateClientAdminRequestTokenEndpointAuthMethodClientSecretPost string = "client_secret_post" // CreateClientAdminRequestTokenEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" CreateClientAdminRequestTokenEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // CreateClientAdminRequestTokenEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" CreateClientAdminRequestTokenEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // CreateClientAdminRequestTokenEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" CreateClientAdminRequestTokenEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // CreateClientAdminRequestTokenEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" CreateClientAdminRequestTokenEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // CreateClientAdminRequestTokenEndpointAuthMethodNone captures enum value "none" CreateClientAdminRequestTokenEndpointAuthMethodNone string = "none" // CreateClientAdminRequestTokenEndpointAuthMethodUnspecified captures enum value "unspecified" CreateClientAdminRequestTokenEndpointAuthMethodUnspecified string = "unspecified" )
const ( // CreateClientAdminRequestTokenEndpointAuthSigningAlgRS256 captures enum value "RS256" CreateClientAdminRequestTokenEndpointAuthSigningAlgRS256 string = "RS256" // CreateClientAdminRequestTokenEndpointAuthSigningAlgES256 captures enum value "ES256" CreateClientAdminRequestTokenEndpointAuthSigningAlgES256 string = "ES256" // CreateClientAdminRequestTokenEndpointAuthSigningAlgPS256 captures enum value "PS256" CreateClientAdminRequestTokenEndpointAuthSigningAlgPS256 string = "PS256" // CreateClientAdminRequestTokenEndpointAuthSigningAlgHS256 captures enum value "HS256" CreateClientAdminRequestTokenEndpointAuthSigningAlgHS256 string = "HS256" // CreateClientAdminRequestTokenEndpointAuthSigningAlgEmpty captures enum value "" CreateClientAdminRequestTokenEndpointAuthSigningAlgEmpty string = "" )
const ( // CreateClientAdminRequestUserinfoSignedResponseAlgNone captures enum value "none" CreateClientAdminRequestUserinfoSignedResponseAlgNone string = "none" // CreateClientAdminRequestUserinfoSignedResponseAlgRS256 captures enum value "RS256" CreateClientAdminRequestUserinfoSignedResponseAlgRS256 string = "RS256" // CreateClientAdminRequestUserinfoSignedResponseAlgES256 captures enum value "ES256" CreateClientAdminRequestUserinfoSignedResponseAlgES256 string = "ES256" )
const ( // CredentialPayloadCredentialTypePassword captures enum value "password" CredentialPayloadCredentialTypePassword string = "password" // CredentialPayloadCredentialTypeWebauthn captures enum value "webauthn" CredentialPayloadCredentialTypeWebauthn string = "webauthn" // CredentialPayloadCredentialTypeTotp captures enum value "totp" CredentialPayloadCredentialTypeTotp string = "totp" )
const ( // DCRDetailsTokenEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" DCRDetailsTokenEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // DCRDetailsTokenEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" DCRDetailsTokenEndpointAuthMethodClientSecretPost string = "client_secret_post" // DCRDetailsTokenEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" DCRDetailsTokenEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // DCRDetailsTokenEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" DCRDetailsTokenEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // DCRDetailsTokenEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" DCRDetailsTokenEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // DCRDetailsTokenEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" DCRDetailsTokenEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // DCRDetailsTokenEndpointAuthMethodNone captures enum value "none" DCRDetailsTokenEndpointAuthMethodNone string = "none" // DCRDetailsTokenEndpointAuthMethodUnspecified captures enum value "unspecified" DCRDetailsTokenEndpointAuthMethodUnspecified string = "unspecified" )
const ( // EmailSettingsProviderSMTP captures enum value "smtp" EmailSettingsProviderSMTP string = "smtp" // EmailSettingsProviderEmbedded captures enum value "embedded" EmailSettingsProviderEmbedded string = "embedded" )
const ( // ExtendedRoleResourceRoleAdmin captures enum value "admin" ExtendedRoleResourceRoleAdmin string = "admin" // ExtendedRoleResourceRoleBusinessAdmin captures enum value "business_admin" ExtendedRoleResourceRoleBusinessAdmin string = "business_admin" // ExtendedRoleResourceRoleAuditor captures enum value "auditor" ExtendedRoleResourceRoleAuditor string = "auditor" // ExtendedRoleResourceRoleManager captures enum value "manager" ExtendedRoleResourceRoleManager string = "manager" // ExtendedRoleResourceRoleUserManager captures enum value "user_manager" ExtendedRoleResourceRoleUserManager string = "user_manager" // ExtendedRoleResourceRoleMember captures enum value "member" ExtendedRoleResourceRoleMember string = "member" )
const ( // ExtendedRoleResourceTypeTenant captures enum value "tenant" ExtendedRoleResourceTypeTenant string = "tenant" // ExtendedRoleResourceTypeWorkspace captures enum value "workspace" ExtendedRoleResourceTypeWorkspace string = "workspace" // ExtendedRoleResourceTypeIdentityPool captures enum value "identity_pool" ExtendedRoleResourceTypeIdentityPool string = "identity_pool" )
const ( // FDXConsentRevocationInitiatorDATAACCESSPLATFORM captures enum value "DATA_ACCESS_PLATFORM" FDXConsentRevocationInitiatorDATAACCESSPLATFORM string = "DATA_ACCESS_PLATFORM" // FDXConsentRevocationInitiatorDATAPROVIDER captures enum value "DATA_PROVIDER" FDXConsentRevocationInitiatorDATAPROVIDER string = "DATA_PROVIDER" // FDXConsentRevocationInitiatorDATARECIPIENT captures enum value "DATA_RECIPIENT" FDXConsentRevocationInitiatorDATARECIPIENT string = "DATA_RECIPIENT" // FDXConsentRevocationInitiatorINDIVIDUAL captures enum value "INDIVIDUAL" FDXConsentRevocationInitiatorINDIVIDUAL string = "INDIVIDUAL" // FDXConsentRevocationInitiatorMERCHANT captures enum value "MERCHANT" FDXConsentRevocationInitiatorMERCHANT string = "MERCHANT" // FDXConsentRevocationInitiatorVENDOR captures enum value "VENDOR" FDXConsentRevocationInitiatorVENDOR string = "VENDOR" )
const ( // FDXConsentRevocationReasonBUSINESSRULE captures enum value "BUSINESS_RULE" FDXConsentRevocationReasonBUSINESSRULE string = "BUSINESS_RULE" // FDXConsentRevocationReasonUSERACTION captures enum value "USER_ACTION" FDXConsentRevocationReasonUSERACTION string = "USER_ACTION" )
const ( // GatewayAPIAPITypeRest captures enum value "rest" GatewayAPIAPITypeRest string = "rest" // GatewayAPIAPITypeGraphql captures enum value "graphql" GatewayAPIAPITypeGraphql string = "graphql" )
const ( // GrantIdentityPoolRoleRequestTypeIdentityPoolUser captures enum value "identity_pool_user" GrantIdentityPoolRoleRequestTypeIdentityPoolUser string = "identity_pool_user" // GrantIdentityPoolRoleRequestTypeIdp captures enum value "idp" GrantIdentityPoolRoleRequestTypeIdp string = "idp" )
const ( // GrantTenantRoleRequestRoleAdmin captures enum value "admin" GrantTenantRoleRequestRoleAdmin string = "admin" // GrantTenantRoleRequestRoleBusinessAdmin captures enum value "business_admin" GrantTenantRoleRequestRoleBusinessAdmin string = "business_admin" // GrantTenantRoleRequestRoleAuditor captures enum value "auditor" GrantTenantRoleRequestRoleAuditor string = "auditor" // GrantTenantRoleRequestRoleMember captures enum value "member" GrantTenantRoleRequestRoleMember string = "member" )
const ( // GrantTenantRoleRequestTypeIdentityPoolUser captures enum value "identity_pool_user" GrantTenantRoleRequestTypeIdentityPoolUser string = "identity_pool_user" // GrantTenantRoleRequestTypeIdp captures enum value "idp" GrantTenantRoleRequestTypeIdp string = "idp" )
const ( // GrantWorkspaceRoleRequestRoleAdmin captures enum value "admin" GrantWorkspaceRoleRequestRoleAdmin string = "admin" // GrantWorkspaceRoleRequestRoleAuditor captures enum value "auditor" GrantWorkspaceRoleRequestRoleAuditor string = "auditor" // GrantWorkspaceRoleRequestRoleManager captures enum value "manager" GrantWorkspaceRoleRequestRoleManager string = "manager" // GrantWorkspaceRoleRequestRoleUserManager captures enum value "user_manager" GrantWorkspaceRoleRequestRoleUserManager string = "user_manager" // GrantWorkspaceRoleRequestRoleMember captures enum value "member" GrantWorkspaceRoleRequestRoleMember string = "member" )
const ( // GrantWorkspaceRoleRequestTypeIdentityPoolUser captures enum value "identity_pool_user" GrantWorkspaceRoleRequestTypeIdentityPoolUser string = "identity_pool_user" // GrantWorkspaceRoleRequestTypeIdp captures enum value "idp" GrantWorkspaceRoleRequestTypeIdp string = "idp" )
const ( // IDPDiscoveryDiscoveryModeDomainMatching captures enum value "domain_matching" IDPDiscoveryDiscoveryModeDomainMatching string = "domain_matching" // IDPDiscoveryDiscoveryModeScriptExecution captures enum value "script_execution" IDPDiscoveryDiscoveryModeScriptExecution string = "script_execution" )
const ( // IdentityPoolRoleSubjectTypeIdentityPoolUser captures enum value "identity_pool_user" IdentityPoolRoleSubjectTypeIdentityPoolUser string = "identity_pool_user" // IdentityPoolRoleSubjectTypeIdp captures enum value "idp" IdentityPoolRoleSubjectTypeIdp string = "idp" )
const ( // ImportServiceConfigurationResultTypeOauth2 captures enum value "oauth2" ImportServiceConfigurationResultTypeOauth2 string = "oauth2" // ImportServiceConfigurationResultTypeOidc captures enum value "oidc" ImportServiceConfigurationResultTypeOidc string = "oidc" // ImportServiceConfigurationResultTypeSystem captures enum value "system" ImportServiceConfigurationResultTypeSystem string = "system" // ImportServiceConfigurationResultTypeUser captures enum value "user" ImportServiceConfigurationResultTypeUser string = "user" // ImportServiceConfigurationResultTypeOpenbanking captures enum value "openbanking" ImportServiceConfigurationResultTypeOpenbanking string = "openbanking" )
const ( // JITProvisioningAdminRoleTypeAdmin captures enum value "admin" JITProvisioningAdminRoleTypeAdmin string = "admin" // JITProvisioningAdminRoleTypeBusinessAdmin captures enum value "business_admin" JITProvisioningAdminRoleTypeBusinessAdmin string = "business_admin" // JITProvisioningAdminRoleTypeAuditor captures enum value "auditor" JITProvisioningAdminRoleTypeAuditor string = "auditor" // JITProvisioningAdminRoleTypeMember captures enum value "member" JITProvisioningAdminRoleTypeMember string = "member" )
const ( // MFAMethodMechanismSms captures enum value "sms" MFAMethodMechanismSms string = "sms" // MFAMethodMechanismEmail captures enum value "email" MFAMethodMechanismEmail string = "email" )
const ( // MFAMethodResponseMechanismSms captures enum value "sms" MFAMethodResponseMechanismSms string = "sms" // MFAMethodResponseMechanismEmail captures enum value "email" MFAMethodResponseMechanismEmail string = "email" )
const ( // OIDCSettingsAuthenticationMethodClientSecret captures enum value "client_secret" OIDCSettingsAuthenticationMethodClientSecret string = "client_secret" // OIDCSettingsAuthenticationMethodPrivateKeyJwt captures enum value "private_key_jwt" OIDCSettingsAuthenticationMethodPrivateKeyJwt string = "private_key_jwt" )
const ( // OTPPayloadTypeSms captures enum value "sms" OTPPayloadTypeSms string = "sms" // OTPPayloadTypeEmail captures enum value "email" OTPPayloadTypeEmail string = "email" )
const ( // OrganizationResponseSubjectFormatHash captures enum value "hash" OrganizationResponseSubjectFormatHash string = "hash" // OrganizationResponseSubjectFormatLegacy captures enum value "legacy" OrganizationResponseSubjectFormatLegacy string = "legacy" )
const ( // PayloadSettingsFormatJSON captures enum value "json" PayloadSettingsFormatJSON string = "json" // PayloadSettingsFormatJws captures enum value "jws" PayloadSettingsFormatJws string = "jws" )
const ( // RevokeIdentityPoolRoleRequestTypeIdentityPoolUser captures enum value "identity_pool_user" RevokeIdentityPoolRoleRequestTypeIdentityPoolUser string = "identity_pool_user" // RevokeIdentityPoolRoleRequestTypeIdp captures enum value "idp" RevokeIdentityPoolRoleRequestTypeIdp string = "idp" )
const ( // RevokeTenantRoleRequestRoleAdmin captures enum value "admin" RevokeTenantRoleRequestRoleAdmin string = "admin" // RevokeTenantRoleRequestRoleBusinessAdmin captures enum value "business_admin" RevokeTenantRoleRequestRoleBusinessAdmin string = "business_admin" // RevokeTenantRoleRequestRoleAuditor captures enum value "auditor" RevokeTenantRoleRequestRoleAuditor string = "auditor" // RevokeTenantRoleRequestRoleMember captures enum value "member" RevokeTenantRoleRequestRoleMember string = "member" )
const ( // RevokeTenantRoleRequestTypeIdentityPoolUser captures enum value "identity_pool_user" RevokeTenantRoleRequestTypeIdentityPoolUser string = "identity_pool_user" // RevokeTenantRoleRequestTypeIdp captures enum value "idp" RevokeTenantRoleRequestTypeIdp string = "idp" )
const ( // RevokeWorkspaceRoleRequestRoleAdmin captures enum value "admin" RevokeWorkspaceRoleRequestRoleAdmin string = "admin" // RevokeWorkspaceRoleRequestRoleAuditor captures enum value "auditor" RevokeWorkspaceRoleRequestRoleAuditor string = "auditor" // RevokeWorkspaceRoleRequestRoleManager captures enum value "manager" RevokeWorkspaceRoleRequestRoleManager string = "manager" // RevokeWorkspaceRoleRequestRoleUserManager captures enum value "user_manager" RevokeWorkspaceRoleRequestRoleUserManager string = "user_manager" // RevokeWorkspaceRoleRequestRoleMember captures enum value "member" RevokeWorkspaceRoleRequestRoleMember string = "member" )
const ( // RevokeWorkspaceRoleRequestTypeIdentityPoolUser captures enum value "identity_pool_user" RevokeWorkspaceRoleRequestTypeIdentityPoolUser string = "identity_pool_user" // RevokeWorkspaceRoleRequestTypeIdp captures enum value "idp" RevokeWorkspaceRoleRequestTypeIdp string = "idp" )
const ( // Rfc6902PatchOperationOpAdd captures enum value "add" Rfc6902PatchOperationOpAdd string = "add" // Rfc6902PatchOperationOpRemove captures enum value "remove" Rfc6902PatchOperationOpRemove string = "remove" // Rfc6902PatchOperationOpReplace captures enum value "replace" Rfc6902PatchOperationOpReplace string = "replace" // Rfc6902PatchOperationOpMove captures enum value "move" Rfc6902PatchOperationOpMove string = "move" // Rfc6902PatchOperationOpCopy captures enum value "copy" Rfc6902PatchOperationOpCopy string = "copy" // Rfc6902PatchOperationOpTest captures enum value "test" Rfc6902PatchOperationOpTest string = "test" )
const ( // RoleGrantAuditPayloadRoleAdmin captures enum value "admin" RoleGrantAuditPayloadRoleAdmin string = "admin" // RoleGrantAuditPayloadRoleBusinessAdmin captures enum value "business_admin" RoleGrantAuditPayloadRoleBusinessAdmin string = "business_admin" // RoleGrantAuditPayloadRoleAuditor captures enum value "auditor" RoleGrantAuditPayloadRoleAuditor string = "auditor" // RoleGrantAuditPayloadRoleManager captures enum value "manager" RoleGrantAuditPayloadRoleManager string = "manager" // RoleGrantAuditPayloadRoleUserManager captures enum value "user_manager" RoleGrantAuditPayloadRoleUserManager string = "user_manager" // RoleGrantAuditPayloadRoleMember captures enum value "member" RoleGrantAuditPayloadRoleMember string = "member" )
const ( // RoleResourceTypeTenant captures enum value "tenant" RoleResourceTypeTenant string = "tenant" // RoleResourceTypeWorkspace captures enum value "workspace" RoleResourceTypeWorkspace string = "workspace" // RoleResourceTypeIdentityPool captures enum value "identity_pool" RoleResourceTypeIdentityPool string = "identity_pool" )
const ( // RoleSubjectTypeIdentityPoolUser captures enum value "identity_pool_user" RoleSubjectTypeIdentityPoolUser string = "identity_pool_user" // RoleSubjectTypeIdp captures enum value "idp" RoleSubjectTypeIdp string = "idp" )
const ( // SAMLV2SettingsNameIDFormatUrnOasisNamesTcSAML1Dot1NameidDashFormatEmailAddress captures enum value "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" SAMLV2SettingsNameIDFormatUrnOasisNamesTcSAML1Dot1NameidDashFormatEmailAddress string = "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" // SAMLV2SettingsNameIDFormatUrnOasisNamesTcSAML1Dot1NameidDashFormatUnspecified captures enum value "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" SAMLV2SettingsNameIDFormatUrnOasisNamesTcSAML1Dot1NameidDashFormatUnspecified string = "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" // SAMLV2SettingsNameIDFormatUrnOasisNamesTcSAML1Dot1NameidDashFormatTransient captures enum value "urn:oasis:names:tc:SAML:1.1:nameid-format:transient" SAMLV2SettingsNameIDFormatUrnOasisNamesTcSAML1Dot1NameidDashFormatTransient string = "urn:oasis:names:tc:SAML:1.1:nameid-format:transient" // SAMLV2SettingsNameIDFormatUrnOasisNamesTcSAML1Dot1NameidDashFormatPersistent captures enum value "urn:oasis:names:tc:SAML:1.1:nameid-format:persistent" SAMLV2SettingsNameIDFormatUrnOasisNamesTcSAML1Dot1NameidDashFormatPersistent string = "urn:oasis:names:tc:SAML:1.1:nameid-format:persistent" )
const ( // SAMLV2SettingsSigningMethodRsaDashShaDash256 captures enum value "rsa-sha-256" SAMLV2SettingsSigningMethodRsaDashShaDash256 string = "rsa-sha-256" // SAMLV2SettingsSigningMethodRsaDashShaDash512 captures enum value "rsa-sha-512" SAMLV2SettingsSigningMethodRsaDashShaDash512 string = "rsa-sha-512" // SAMLV2SettingsSigningMethodRsaDashShaDash1 captures enum value "rsa-sha-1" SAMLV2SettingsSigningMethodRsaDashShaDash1 string = "rsa-sha-1" )
const ( // SMSSettingsProviderTwilio captures enum value "twilio" SMSSettingsProviderTwilio string = "twilio" // SMSSettingsProviderEmbedded captures enum value "embedded" SMSSettingsProviderEmbedded string = "embedded" )
const ( // ScriptExecutionAuditPayloadExecutionPointPostAuthnCtx captures enum value "post_authn_ctx" ScriptExecutionAuditPayloadExecutionPointPostAuthnCtx string = "post_authn_ctx" // ScriptExecutionAuditPayloadExecutionPointAllowedIdpIds captures enum value "allowed_idp_ids" ScriptExecutionAuditPayloadExecutionPointAllowedIdpIds string = "allowed_idp_ids" // ScriptExecutionAuditPayloadExecutionPointTokenMinting captures enum value "token_minting" ScriptExecutionAuditPayloadExecutionPointTokenMinting string = "token_minting" // ScriptExecutionAuditPayloadExecutionPointClientTokenMinting captures enum value "client_token_minting" ScriptExecutionAuditPayloadExecutionPointClientTokenMinting string = "client_token_minting" )
const ( // ScriptExecutionPointTypePostAuthnCtx captures enum value "post_authn_ctx" ScriptExecutionPointTypePostAuthnCtx string = "post_authn_ctx" // ScriptExecutionPointTypeAllowedIdpIds captures enum value "allowed_idp_ids" ScriptExecutionPointTypeAllowedIdpIds string = "allowed_idp_ids" // ScriptExecutionPointTypeTokenMinting captures enum value "token_minting" ScriptExecutionPointTypeTokenMinting string = "token_minting" // ScriptExecutionPointTypeClientTokenMinting captures enum value "client_token_minting" ScriptExecutionPointTypeClientTokenMinting string = "client_token_minting" )
const ( // ServerAccessTokenStrategyJwt captures enum value "jwt" ServerAccessTokenStrategyJwt string = "jwt" // ServerAccessTokenStrategyOpaque captures enum value "opaque" ServerAccessTokenStrategyOpaque string = "opaque" )
const ( // ServerKeyTypeRsa captures enum value "rsa" ServerKeyTypeRsa string = "rsa" // ServerKeyTypeEcdsa captures enum value "ecdsa" ServerKeyTypeEcdsa string = "ecdsa" // ServerKeyTypePs captures enum value "ps" ServerKeyTypePs string = "ps" )
const ( // ServerProfileDefault captures enum value "default" ServerProfileDefault string = "default" // ServerProfileDemo captures enum value "demo" ServerProfileDemo string = "demo" // ServerProfileWorkforce captures enum value "workforce" ServerProfileWorkforce string = "workforce" // ServerProfileConsumer captures enum value "consumer" ServerProfileConsumer string = "consumer" // ServerProfilePartners captures enum value "partners" ServerProfilePartners string = "partners" // ServerProfileThirdParty captures enum value "third_party" ServerProfileThirdParty string = "third_party" // ServerProfileFapiAdvanced captures enum value "fapi_advanced" ServerProfileFapiAdvanced string = "fapi_advanced" // ServerProfileFapiRw captures enum value "fapi_rw" ServerProfileFapiRw string = "fapi_rw" // ServerProfileFapiRo captures enum value "fapi_ro" ServerProfileFapiRo string = "fapi_ro" // ServerProfileOpenbankingUkFapiAdvanced captures enum value "openbanking_uk_fapi_advanced" ServerProfileOpenbankingUkFapiAdvanced string = "openbanking_uk_fapi_advanced" // ServerProfileOpenbankingUk captures enum value "openbanking_uk" ServerProfileOpenbankingUk string = "openbanking_uk" // ServerProfileOpenbankingBr captures enum value "openbanking_br" ServerProfileOpenbankingBr string = "openbanking_br" // ServerProfileOpenbankingBrUnico captures enum value "openbanking_br_unico" ServerProfileOpenbankingBrUnico string = "openbanking_br_unico" // ServerProfileCdrAustralia captures enum value "cdr_australia" ServerProfileCdrAustralia string = "cdr_australia" // ServerProfileCdrAustraliaFapiRw captures enum value "cdr_australia_fapi_rw" ServerProfileCdrAustraliaFapiRw string = "cdr_australia_fapi_rw" // ServerProfileFdx captures enum value "fdx" ServerProfileFdx string = "fdx" // ServerProfileOpenbankingKsa captures enum value "openbanking_ksa" ServerProfileOpenbankingKsa string = "openbanking_ksa" // ServerProfileFapi20Security captures enum value "fapi_20_security" ServerProfileFapi20Security string = "fapi_20_security" // ServerProfileFapi20MessageSigning captures enum value "fapi_20_message_signing" ServerProfileFapi20MessageSigning string = "fapi_20_message_signing" // ServerProfileConnectID captures enum value "connect_id" ServerProfileConnectID string = "connect_id" )
const ( // ServerSubjectFormatHash captures enum value "hash" ServerSubjectFormatHash string = "hash" // ServerSubjectFormatLegacy captures enum value "legacy" ServerSubjectFormatLegacy string = "legacy" )
const ( // ServerTypeAdmin captures enum value "admin" ServerTypeAdmin string = "admin" // ServerTypeDeveloper captures enum value "developer" ServerTypeDeveloper string = "developer" // ServerTypeSystem captures enum value "system" ServerTypeSystem string = "system" // ServerTypeRegular captures enum value "regular" ServerTypeRegular string = "regular" // ServerTypeOrganization captures enum value "organization" ServerTypeOrganization string = "organization" )
const ( // ServerAuditPayloadAccessTokenStrategyJwt captures enum value "jwt" ServerAuditPayloadAccessTokenStrategyJwt string = "jwt" // ServerAuditPayloadAccessTokenStrategyOpaque captures enum value "opaque" ServerAuditPayloadAccessTokenStrategyOpaque string = "opaque" )
const ( // ServerAuditPayloadKeyTypeRsa captures enum value "rsa" ServerAuditPayloadKeyTypeRsa string = "rsa" // ServerAuditPayloadKeyTypeEcdsa captures enum value "ecdsa" ServerAuditPayloadKeyTypeEcdsa string = "ecdsa" // ServerAuditPayloadKeyTypePs captures enum value "ps" ServerAuditPayloadKeyTypePs string = "ps" )
const ( // ServerAuditPayloadProfileDefault captures enum value "default" ServerAuditPayloadProfileDefault string = "default" // ServerAuditPayloadProfileDemo captures enum value "demo" ServerAuditPayloadProfileDemo string = "demo" // ServerAuditPayloadProfileWorkforce captures enum value "workforce" ServerAuditPayloadProfileWorkforce string = "workforce" // ServerAuditPayloadProfileConsumer captures enum value "consumer" ServerAuditPayloadProfileConsumer string = "consumer" // ServerAuditPayloadProfilePartners captures enum value "partners" ServerAuditPayloadProfilePartners string = "partners" // ServerAuditPayloadProfileThirdParty captures enum value "third_party" ServerAuditPayloadProfileThirdParty string = "third_party" // ServerAuditPayloadProfileFapiAdvanced captures enum value "fapi_advanced" ServerAuditPayloadProfileFapiAdvanced string = "fapi_advanced" // ServerAuditPayloadProfileFapiRw captures enum value "fapi_rw" ServerAuditPayloadProfileFapiRw string = "fapi_rw" // ServerAuditPayloadProfileFapiRo captures enum value "fapi_ro" ServerAuditPayloadProfileFapiRo string = "fapi_ro" // ServerAuditPayloadProfileOpenbankingUkFapiAdvanced captures enum value "openbanking_uk_fapi_advanced" ServerAuditPayloadProfileOpenbankingUkFapiAdvanced string = "openbanking_uk_fapi_advanced" // ServerAuditPayloadProfileOpenbankingUk captures enum value "openbanking_uk" ServerAuditPayloadProfileOpenbankingUk string = "openbanking_uk" // ServerAuditPayloadProfileOpenbankingBr captures enum value "openbanking_br" ServerAuditPayloadProfileOpenbankingBr string = "openbanking_br" // ServerAuditPayloadProfileOpenbankingBrUnico captures enum value "openbanking_br_unico" ServerAuditPayloadProfileOpenbankingBrUnico string = "openbanking_br_unico" // ServerAuditPayloadProfileCdrAustralia captures enum value "cdr_australia" ServerAuditPayloadProfileCdrAustralia string = "cdr_australia" // ServerAuditPayloadProfileCdrAustraliaFapiRw captures enum value "cdr_australia_fapi_rw" ServerAuditPayloadProfileCdrAustraliaFapiRw string = "cdr_australia_fapi_rw" // ServerAuditPayloadProfileFdx captures enum value "fdx" ServerAuditPayloadProfileFdx string = "fdx" // ServerAuditPayloadProfileOpenbankingKsa captures enum value "openbanking_ksa" ServerAuditPayloadProfileOpenbankingKsa string = "openbanking_ksa" // ServerAuditPayloadProfileFapi20Security captures enum value "fapi_20_security" ServerAuditPayloadProfileFapi20Security string = "fapi_20_security" // ServerAuditPayloadProfileFapi20MessageSigning captures enum value "fapi_20_message_signing" ServerAuditPayloadProfileFapi20MessageSigning string = "fapi_20_message_signing" // ServerAuditPayloadProfileConnectID captures enum value "connect_id" ServerAuditPayloadProfileConnectID string = "connect_id" )
const ( // ServerAuditPayloadSubjectFormatHash captures enum value "hash" ServerAuditPayloadSubjectFormatHash string = "hash" // ServerAuditPayloadSubjectFormatLegacy captures enum value "legacy" ServerAuditPayloadSubjectFormatLegacy string = "legacy" )
const ( // ServerAuditPayloadTypeAdmin captures enum value "admin" ServerAuditPayloadTypeAdmin string = "admin" // ServerAuditPayloadTypeDeveloper captures enum value "developer" ServerAuditPayloadTypeDeveloper string = "developer" // ServerAuditPayloadTypeSystem captures enum value "system" ServerAuditPayloadTypeSystem string = "system" // ServerAuditPayloadTypeRegular captures enum value "regular" ServerAuditPayloadTypeRegular string = "regular" // ServerAuditPayloadTypeOrganization captures enum value "organization" ServerAuditPayloadTypeOrganization string = "organization" )
const ( // ServerBindingResponseProfileDefault captures enum value "default" ServerBindingResponseProfileDefault string = "default" // ServerBindingResponseProfileDemo captures enum value "demo" ServerBindingResponseProfileDemo string = "demo" // ServerBindingResponseProfileWorkforce captures enum value "workforce" ServerBindingResponseProfileWorkforce string = "workforce" // ServerBindingResponseProfileConsumer captures enum value "consumer" ServerBindingResponseProfileConsumer string = "consumer" // ServerBindingResponseProfilePartners captures enum value "partners" ServerBindingResponseProfilePartners string = "partners" // ServerBindingResponseProfileThirdParty captures enum value "third_party" ServerBindingResponseProfileThirdParty string = "third_party" // ServerBindingResponseProfileFapiAdvanced captures enum value "fapi_advanced" ServerBindingResponseProfileFapiAdvanced string = "fapi_advanced" // ServerBindingResponseProfileFapiRw captures enum value "fapi_rw" ServerBindingResponseProfileFapiRw string = "fapi_rw" // ServerBindingResponseProfileFapiRo captures enum value "fapi_ro" ServerBindingResponseProfileFapiRo string = "fapi_ro" // ServerBindingResponseProfileOpenbankingUkFapiAdvanced captures enum value "openbanking_uk_fapi_advanced" ServerBindingResponseProfileOpenbankingUkFapiAdvanced string = "openbanking_uk_fapi_advanced" // ServerBindingResponseProfileOpenbankingUk captures enum value "openbanking_uk" ServerBindingResponseProfileOpenbankingUk string = "openbanking_uk" // ServerBindingResponseProfileOpenbankingBr captures enum value "openbanking_br" ServerBindingResponseProfileOpenbankingBr string = "openbanking_br" // ServerBindingResponseProfileOpenbankingBrUnico captures enum value "openbanking_br_unico" ServerBindingResponseProfileOpenbankingBrUnico string = "openbanking_br_unico" // ServerBindingResponseProfileCdrAustralia captures enum value "cdr_australia" ServerBindingResponseProfileCdrAustralia string = "cdr_australia" // ServerBindingResponseProfileCdrAustraliaFapiRw captures enum value "cdr_australia_fapi_rw" ServerBindingResponseProfileCdrAustraliaFapiRw string = "cdr_australia_fapi_rw" // ServerBindingResponseProfileFdx captures enum value "fdx" ServerBindingResponseProfileFdx string = "fdx" // ServerBindingResponseProfileOpenbankingKsa captures enum value "openbanking_ksa" ServerBindingResponseProfileOpenbankingKsa string = "openbanking_ksa" // ServerBindingResponseProfileFapi20Security captures enum value "fapi_20_security" ServerBindingResponseProfileFapi20Security string = "fapi_20_security" // ServerBindingResponseProfileFapi20MessageSigning captures enum value "fapi_20_message_signing" ServerBindingResponseProfileFapi20MessageSigning string = "fapi_20_message_signing" // ServerBindingResponseProfileConnectID captures enum value "connect_id" ServerBindingResponseProfileConnectID string = "connect_id" )
const ( // ServerBindingResponseTypeAdmin captures enum value "admin" ServerBindingResponseTypeAdmin string = "admin" // ServerBindingResponseTypeDeveloper captures enum value "developer" ServerBindingResponseTypeDeveloper string = "developer" // ServerBindingResponseTypeSystem captures enum value "system" ServerBindingResponseTypeSystem string = "system" // ServerBindingResponseTypeRegular captures enum value "regular" ServerBindingResponseTypeRegular string = "regular" // ServerBindingResponseTypeOrganization captures enum value "organization" ServerBindingResponseTypeOrganization string = "organization" )
const ( // ServerInfoProfileDefault captures enum value "default" ServerInfoProfileDefault string = "default" // ServerInfoProfileDemo captures enum value "demo" ServerInfoProfileDemo string = "demo" // ServerInfoProfileWorkforce captures enum value "workforce" ServerInfoProfileWorkforce string = "workforce" // ServerInfoProfileConsumer captures enum value "consumer" ServerInfoProfileConsumer string = "consumer" // ServerInfoProfilePartners captures enum value "partners" ServerInfoProfilePartners string = "partners" // ServerInfoProfileThirdParty captures enum value "third_party" ServerInfoProfileThirdParty string = "third_party" // ServerInfoProfileFapiAdvanced captures enum value "fapi_advanced" ServerInfoProfileFapiAdvanced string = "fapi_advanced" // ServerInfoProfileFapiRw captures enum value "fapi_rw" ServerInfoProfileFapiRw string = "fapi_rw" // ServerInfoProfileFapiRo captures enum value "fapi_ro" ServerInfoProfileFapiRo string = "fapi_ro" // ServerInfoProfileOpenbankingUkFapiAdvanced captures enum value "openbanking_uk_fapi_advanced" ServerInfoProfileOpenbankingUkFapiAdvanced string = "openbanking_uk_fapi_advanced" // ServerInfoProfileOpenbankingUk captures enum value "openbanking_uk" ServerInfoProfileOpenbankingUk string = "openbanking_uk" // ServerInfoProfileOpenbankingBr captures enum value "openbanking_br" ServerInfoProfileOpenbankingBr string = "openbanking_br" // ServerInfoProfileOpenbankingBrUnico captures enum value "openbanking_br_unico" ServerInfoProfileOpenbankingBrUnico string = "openbanking_br_unico" // ServerInfoProfileCdrAustralia captures enum value "cdr_australia" ServerInfoProfileCdrAustralia string = "cdr_australia" // ServerInfoProfileCdrAustraliaFapiRw captures enum value "cdr_australia_fapi_rw" ServerInfoProfileCdrAustraliaFapiRw string = "cdr_australia_fapi_rw" // ServerInfoProfileFdx captures enum value "fdx" ServerInfoProfileFdx string = "fdx" // ServerInfoProfileOpenbankingKsa captures enum value "openbanking_ksa" ServerInfoProfileOpenbankingKsa string = "openbanking_ksa" // ServerInfoProfileFapi20Security captures enum value "fapi_20_security" ServerInfoProfileFapi20Security string = "fapi_20_security" // ServerInfoProfileFapi20MessageSigning captures enum value "fapi_20_message_signing" ServerInfoProfileFapi20MessageSigning string = "fapi_20_message_signing" // ServerInfoProfileConnectID captures enum value "connect_id" ServerInfoProfileConnectID string = "connect_id" )
const ( // ServerInfoTypeAdmin captures enum value "admin" ServerInfoTypeAdmin string = "admin" // ServerInfoTypeDeveloper captures enum value "developer" ServerInfoTypeDeveloper string = "developer" // ServerInfoTypeSystem captures enum value "system" ServerInfoTypeSystem string = "system" // ServerInfoTypeRegular captures enum value "regular" ServerInfoTypeRegular string = "regular" // ServerInfoTypeOrganization captures enum value "organization" ServerInfoTypeOrganization string = "organization" )
const ( // ServerResponseAccessTokenStrategyJwt captures enum value "jwt" ServerResponseAccessTokenStrategyJwt string = "jwt" // ServerResponseAccessTokenStrategyOpaque captures enum value "opaque" ServerResponseAccessTokenStrategyOpaque string = "opaque" )
const ( // ServerResponseKeyTypeRsa captures enum value "rsa" ServerResponseKeyTypeRsa string = "rsa" // ServerResponseKeyTypeEcdsa captures enum value "ecdsa" ServerResponseKeyTypeEcdsa string = "ecdsa" // ServerResponseKeyTypePs captures enum value "ps" ServerResponseKeyTypePs string = "ps" )
const ( // ServerResponseProfileDefault captures enum value "default" ServerResponseProfileDefault string = "default" // ServerResponseProfileDemo captures enum value "demo" ServerResponseProfileDemo string = "demo" // ServerResponseProfileWorkforce captures enum value "workforce" ServerResponseProfileWorkforce string = "workforce" // ServerResponseProfileConsumer captures enum value "consumer" ServerResponseProfileConsumer string = "consumer" // ServerResponseProfilePartners captures enum value "partners" ServerResponseProfilePartners string = "partners" // ServerResponseProfileThirdParty captures enum value "third_party" ServerResponseProfileThirdParty string = "third_party" // ServerResponseProfileFapiAdvanced captures enum value "fapi_advanced" ServerResponseProfileFapiAdvanced string = "fapi_advanced" // ServerResponseProfileFapiRw captures enum value "fapi_rw" ServerResponseProfileFapiRw string = "fapi_rw" // ServerResponseProfileFapiRo captures enum value "fapi_ro" ServerResponseProfileFapiRo string = "fapi_ro" // ServerResponseProfileOpenbankingUkFapiAdvanced captures enum value "openbanking_uk_fapi_advanced" ServerResponseProfileOpenbankingUkFapiAdvanced string = "openbanking_uk_fapi_advanced" // ServerResponseProfileOpenbankingUk captures enum value "openbanking_uk" ServerResponseProfileOpenbankingUk string = "openbanking_uk" // ServerResponseProfileOpenbankingBr captures enum value "openbanking_br" ServerResponseProfileOpenbankingBr string = "openbanking_br" // ServerResponseProfileOpenbankingBrUnico captures enum value "openbanking_br_unico" ServerResponseProfileOpenbankingBrUnico string = "openbanking_br_unico" // ServerResponseProfileCdrAustralia captures enum value "cdr_australia" ServerResponseProfileCdrAustralia string = "cdr_australia" // ServerResponseProfileCdrAustraliaFapiRw captures enum value "cdr_australia_fapi_rw" ServerResponseProfileCdrAustraliaFapiRw string = "cdr_australia_fapi_rw" // ServerResponseProfileFdx captures enum value "fdx" ServerResponseProfileFdx string = "fdx" // ServerResponseProfileOpenbankingKsa captures enum value "openbanking_ksa" ServerResponseProfileOpenbankingKsa string = "openbanking_ksa" // ServerResponseProfileFapi20Security captures enum value "fapi_20_security" ServerResponseProfileFapi20Security string = "fapi_20_security" // ServerResponseProfileFapi20MessageSigning captures enum value "fapi_20_message_signing" ServerResponseProfileFapi20MessageSigning string = "fapi_20_message_signing" // ServerResponseProfileConnectID captures enum value "connect_id" ServerResponseProfileConnectID string = "connect_id" )
const ( // ServerResponseSubjectFormatHash captures enum value "hash" ServerResponseSubjectFormatHash string = "hash" // ServerResponseSubjectFormatLegacy captures enum value "legacy" ServerResponseSubjectFormatLegacy string = "legacy" )
const ( // ServerResponseTypeAdmin captures enum value "admin" ServerResponseTypeAdmin string = "admin" // ServerResponseTypeDeveloper captures enum value "developer" ServerResponseTypeDeveloper string = "developer" // ServerResponseTypeSystem captures enum value "system" ServerResponseTypeSystem string = "system" // ServerResponseTypeRegular captures enum value "regular" ServerResponseTypeRegular string = "regular" // ServerResponseTypeOrganization captures enum value "organization" ServerResponseTypeOrganization string = "organization" )
const ( // ServiceTypeOauth2 captures enum value "oauth2" ServiceTypeOauth2 string = "oauth2" // ServiceTypeOidc captures enum value "oidc" ServiceTypeOidc string = "oidc" // ServiceTypeSystem captures enum value "system" ServiceTypeSystem string = "system" // ServiceTypeUser captures enum value "user" ServiceTypeUser string = "user" // ServiceTypeOpenbanking captures enum value "openbanking" ServiceTypeOpenbanking string = "openbanking" )
const ( // ServiceAuditPayloadTypeOauth2 captures enum value "oauth2" ServiceAuditPayloadTypeOauth2 string = "oauth2" // ServiceAuditPayloadTypeOidc captures enum value "oidc" ServiceAuditPayloadTypeOidc string = "oidc" // ServiceAuditPayloadTypeSystem captures enum value "system" ServiceAuditPayloadTypeSystem string = "system" // ServiceAuditPayloadTypeUser captures enum value "user" ServiceAuditPayloadTypeUser string = "user" // ServiceAuditPayloadTypeOpenbanking captures enum value "openbanking" ServiceAuditPayloadTypeOpenbanking string = "openbanking" )
const ( // ServiceResponseTypeOauth2 captures enum value "oauth2" ServiceResponseTypeOauth2 string = "oauth2" // ServiceResponseTypeOidc captures enum value "oidc" ServiceResponseTypeOidc string = "oidc" // ServiceResponseTypeSystem captures enum value "system" ServiceResponseTypeSystem string = "system" // ServiceResponseTypeUser captures enum value "user" ServiceResponseTypeUser string = "user" // ServiceResponseTypeOpenbanking captures enum value "openbanking" ServiceResponseTypeOpenbanking string = "openbanking" )
const ( // ServiceWithAudienceTypeOauth2 captures enum value "oauth2" ServiceWithAudienceTypeOauth2 string = "oauth2" // ServiceWithAudienceTypeOidc captures enum value "oidc" ServiceWithAudienceTypeOidc string = "oidc" // ServiceWithAudienceTypeSystem captures enum value "system" ServiceWithAudienceTypeSystem string = "system" // ServiceWithAudienceTypeUser captures enum value "user" ServiceWithAudienceTypeUser string = "user" // ServiceWithAudienceTypeOpenbanking captures enum value "openbanking" ServiceWithAudienceTypeOpenbanking string = "openbanking" )
const ( // ServiceWithScopesResponseTypeOauth2 captures enum value "oauth2" ServiceWithScopesResponseTypeOauth2 string = "oauth2" // ServiceWithScopesResponseTypeOidc captures enum value "oidc" ServiceWithScopesResponseTypeOidc string = "oidc" // ServiceWithScopesResponseTypeSystem captures enum value "system" ServiceWithScopesResponseTypeSystem string = "system" // ServiceWithScopesResponseTypeUser captures enum value "user" ServiceWithScopesResponseTypeUser string = "user" // ServiceWithScopesResponseTypeOpenbanking captures enum value "openbanking" ServiceWithScopesResponseTypeOpenbanking string = "openbanking" )
const ( // TenantRoleSubjectTypeIdentityPoolUser captures enum value "identity_pool_user" TenantRoleSubjectTypeIdentityPoolUser string = "identity_pool_user" // TenantRoleSubjectTypeIdp captures enum value "idp" TenantRoleSubjectTypeIdp string = "idp" )
const ( // UpdateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP" UpdateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP" // UpdateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" UpdateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // UpdateClientAdminRequestAuthorizationEncryptedResponseEncA256GCM captures enum value "A256GCM" UpdateClientAdminRequestAuthorizationEncryptedResponseEncA256GCM string = "A256GCM" // UpdateClientAdminRequestAuthorizationEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256" UpdateClientAdminRequestAuthorizationEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // UpdateClientAdminRequestClientStatusActive captures enum value "active" UpdateClientAdminRequestClientStatusActive string = "active" // UpdateClientAdminRequestClientStatusInactive captures enum value "inactive" UpdateClientAdminRequestClientStatusInactive string = "inactive" )
const ( // UpdateClientAdminRequestClientTypeOauth2 captures enum value "oauth2" UpdateClientAdminRequestClientTypeOauth2 string = "oauth2" // UpdateClientAdminRequestClientTypeSaml captures enum value "saml" UpdateClientAdminRequestClientTypeSaml string = "saml" )
const ( // UpdateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP" UpdateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP" // UpdateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" UpdateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // UpdateClientAdminRequestIDTokenEncryptedResponseEncA256GCM captures enum value "A256GCM" UpdateClientAdminRequestIDTokenEncryptedResponseEncA256GCM string = "A256GCM" // UpdateClientAdminRequestIDTokenEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256" UpdateClientAdminRequestIDTokenEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // UpdateClientAdminRequestIDTokenSignedResponseAlgRS256 captures enum value "RS256" UpdateClientAdminRequestIDTokenSignedResponseAlgRS256 string = "RS256" // UpdateClientAdminRequestIDTokenSignedResponseAlgES256 captures enum value "ES256" UpdateClientAdminRequestIDTokenSignedResponseAlgES256 string = "ES256" // UpdateClientAdminRequestIDTokenSignedResponseAlgPS256 captures enum value "PS256" UpdateClientAdminRequestIDTokenSignedResponseAlgPS256 string = "PS256" )
const ( // UpdateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" UpdateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // UpdateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" UpdateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretPost string = "client_secret_post" // UpdateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" UpdateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // UpdateClientAdminRequestIntrospectionEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" UpdateClientAdminRequestIntrospectionEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // UpdateClientAdminRequestIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" UpdateClientAdminRequestIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // UpdateClientAdminRequestIntrospectionEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" UpdateClientAdminRequestIntrospectionEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // UpdateClientAdminRequestIntrospectionEndpointAuthMethodNone captures enum value "none" UpdateClientAdminRequestIntrospectionEndpointAuthMethodNone string = "none" )
const ( // UpdateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEP captures enum value "RSA-OAEP" UpdateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEP string = "RSA-OAEP" // UpdateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256" UpdateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEPDash256 string = "RSA-OAEP-256" )
const ( // UpdateClientAdminRequestRequestObjectEncryptionEncA256GCM captures enum value "A256GCM" UpdateClientAdminRequestRequestObjectEncryptionEncA256GCM string = "A256GCM" // UpdateClientAdminRequestRequestObjectEncryptionEncA128CBCDashHS256 captures enum value "A128CBC-HS256" UpdateClientAdminRequestRequestObjectEncryptionEncA128CBCDashHS256 string = "A128CBC-HS256" )
const ( // UpdateClientAdminRequestRequestObjectSigningAlgAny captures enum value "any" UpdateClientAdminRequestRequestObjectSigningAlgAny string = "any" // UpdateClientAdminRequestRequestObjectSigningAlgNone captures enum value "none" UpdateClientAdminRequestRequestObjectSigningAlgNone string = "none" // UpdateClientAdminRequestRequestObjectSigningAlgRS256 captures enum value "RS256" UpdateClientAdminRequestRequestObjectSigningAlgRS256 string = "RS256" // UpdateClientAdminRequestRequestObjectSigningAlgES256 captures enum value "ES256" UpdateClientAdminRequestRequestObjectSigningAlgES256 string = "ES256" // UpdateClientAdminRequestRequestObjectSigningAlgPS256 captures enum value "PS256" UpdateClientAdminRequestRequestObjectSigningAlgPS256 string = "PS256" )
const ( // UpdateClientAdminRequestRevocationEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" UpdateClientAdminRequestRevocationEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // UpdateClientAdminRequestRevocationEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" UpdateClientAdminRequestRevocationEndpointAuthMethodClientSecretPost string = "client_secret_post" // UpdateClientAdminRequestRevocationEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" UpdateClientAdminRequestRevocationEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // UpdateClientAdminRequestRevocationEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" UpdateClientAdminRequestRevocationEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // UpdateClientAdminRequestRevocationEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" UpdateClientAdminRequestRevocationEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // UpdateClientAdminRequestRevocationEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" UpdateClientAdminRequestRevocationEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // UpdateClientAdminRequestRevocationEndpointAuthMethodNone captures enum value "none" UpdateClientAdminRequestRevocationEndpointAuthMethodNone string = "none" )
const ( // UpdateClientAdminRequestSubjectTypePublic captures enum value "public" UpdateClientAdminRequestSubjectTypePublic string = "public" // UpdateClientAdminRequestSubjectTypePairwise captures enum value "pairwise" UpdateClientAdminRequestSubjectTypePairwise string = "pairwise" )
const ( // UpdateClientAdminRequestTokenEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic" UpdateClientAdminRequestTokenEndpointAuthMethodClientSecretBasic string = "client_secret_basic" // UpdateClientAdminRequestTokenEndpointAuthMethodClientSecretPost captures enum value "client_secret_post" UpdateClientAdminRequestTokenEndpointAuthMethodClientSecretPost string = "client_secret_post" // UpdateClientAdminRequestTokenEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt" UpdateClientAdminRequestTokenEndpointAuthMethodClientSecretJwt string = "client_secret_jwt" // UpdateClientAdminRequestTokenEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt" UpdateClientAdminRequestTokenEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt" // UpdateClientAdminRequestTokenEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth" UpdateClientAdminRequestTokenEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth" // UpdateClientAdminRequestTokenEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth" UpdateClientAdminRequestTokenEndpointAuthMethodTLSClientAuth string = "tls_client_auth" // UpdateClientAdminRequestTokenEndpointAuthMethodNone captures enum value "none" UpdateClientAdminRequestTokenEndpointAuthMethodNone string = "none" // UpdateClientAdminRequestTokenEndpointAuthMethodUnspecified captures enum value "unspecified" UpdateClientAdminRequestTokenEndpointAuthMethodUnspecified string = "unspecified" )
const ( // UpdateClientAdminRequestTokenEndpointAuthSigningAlgRS256 captures enum value "RS256" UpdateClientAdminRequestTokenEndpointAuthSigningAlgRS256 string = "RS256" // UpdateClientAdminRequestTokenEndpointAuthSigningAlgES256 captures enum value "ES256" UpdateClientAdminRequestTokenEndpointAuthSigningAlgES256 string = "ES256" // UpdateClientAdminRequestTokenEndpointAuthSigningAlgPS256 captures enum value "PS256" UpdateClientAdminRequestTokenEndpointAuthSigningAlgPS256 string = "PS256" // UpdateClientAdminRequestTokenEndpointAuthSigningAlgHS256 captures enum value "HS256" UpdateClientAdminRequestTokenEndpointAuthSigningAlgHS256 string = "HS256" // UpdateClientAdminRequestTokenEndpointAuthSigningAlgEmpty captures enum value "" UpdateClientAdminRequestTokenEndpointAuthSigningAlgEmpty string = "" )
const ( // UpdateClientAdminRequestUserinfoSignedResponseAlgNone captures enum value "none" UpdateClientAdminRequestUserinfoSignedResponseAlgNone string = "none" // UpdateClientAdminRequestUserinfoSignedResponseAlgRS256 captures enum value "RS256" UpdateClientAdminRequestUserinfoSignedResponseAlgRS256 string = "RS256" // UpdateClientAdminRequestUserinfoSignedResponseAlgES256 captures enum value "ES256" UpdateClientAdminRequestUserinfoSignedResponseAlgES256 string = "ES256" )
const ( // UserAuthenticatedPayloadAuthnMethodTotp captures enum value "totp" UserAuthenticatedPayloadAuthnMethodTotp string = "totp" // UserAuthenticatedPayloadAuthnMethodPassword captures enum value "password" UserAuthenticatedPayloadAuthnMethodPassword string = "password" // UserAuthenticatedPayloadAuthnMethodOtp captures enum value "otp" UserAuthenticatedPayloadAuthnMethodOtp string = "otp" // UserAuthenticatedPayloadAuthnMethodWebauthn captures enum value "webauthn" UserAuthenticatedPayloadAuthnMethodWebauthn string = "webauthn" )
const ( // UserAuthenticatedPayloadMfaTotp captures enum value "totp" UserAuthenticatedPayloadMfaTotp string = "totp" // UserAuthenticatedPayloadMfaPassword captures enum value "password" UserAuthenticatedPayloadMfaPassword string = "password" // UserAuthenticatedPayloadMfaOtp captures enum value "otp" UserAuthenticatedPayloadMfaOtp string = "otp" // UserAuthenticatedPayloadMfaWebauthn captures enum value "webauthn" UserAuthenticatedPayloadMfaWebauthn string = "webauthn" )
const ( // UserPayloadStatusActive captures enum value "active" UserPayloadStatusActive string = "active" // UserPayloadStatusInactive captures enum value "inactive" UserPayloadStatusInactive string = "inactive" // UserPayloadStatusDeleted captures enum value "deleted" UserPayloadStatusDeleted string = "deleted" // UserPayloadStatusNew captures enum value "new" UserPayloadStatusNew string = "new" )
const ( // WorkspaceResponseProfileDefault captures enum value "default" WorkspaceResponseProfileDefault string = "default" // WorkspaceResponseProfileDemo captures enum value "demo" WorkspaceResponseProfileDemo string = "demo" // WorkspaceResponseProfileWorkforce captures enum value "workforce" WorkspaceResponseProfileWorkforce string = "workforce" // WorkspaceResponseProfileConsumer captures enum value "consumer" WorkspaceResponseProfileConsumer string = "consumer" // WorkspaceResponseProfilePartners captures enum value "partners" WorkspaceResponseProfilePartners string = "partners" // WorkspaceResponseProfileThirdParty captures enum value "third_party" WorkspaceResponseProfileThirdParty string = "third_party" // WorkspaceResponseProfileFapiAdvanced captures enum value "fapi_advanced" WorkspaceResponseProfileFapiAdvanced string = "fapi_advanced" // WorkspaceResponseProfileFapiRw captures enum value "fapi_rw" WorkspaceResponseProfileFapiRw string = "fapi_rw" // WorkspaceResponseProfileFapiRo captures enum value "fapi_ro" WorkspaceResponseProfileFapiRo string = "fapi_ro" // WorkspaceResponseProfileOpenbankingUkFapiAdvanced captures enum value "openbanking_uk_fapi_advanced" WorkspaceResponseProfileOpenbankingUkFapiAdvanced string = "openbanking_uk_fapi_advanced" // WorkspaceResponseProfileOpenbankingUk captures enum value "openbanking_uk" WorkspaceResponseProfileOpenbankingUk string = "openbanking_uk" // WorkspaceResponseProfileOpenbankingBr captures enum value "openbanking_br" WorkspaceResponseProfileOpenbankingBr string = "openbanking_br" // WorkspaceResponseProfileOpenbankingBrUnico captures enum value "openbanking_br_unico" WorkspaceResponseProfileOpenbankingBrUnico string = "openbanking_br_unico" // WorkspaceResponseProfileCdrAustralia captures enum value "cdr_australia" WorkspaceResponseProfileCdrAustralia string = "cdr_australia" // WorkspaceResponseProfileCdrAustraliaFapiRw captures enum value "cdr_australia_fapi_rw" WorkspaceResponseProfileCdrAustraliaFapiRw string = "cdr_australia_fapi_rw" // WorkspaceResponseProfileFdx captures enum value "fdx" WorkspaceResponseProfileFdx string = "fdx" // WorkspaceResponseProfileOpenbankingKsa captures enum value "openbanking_ksa" WorkspaceResponseProfileOpenbankingKsa string = "openbanking_ksa" // WorkspaceResponseProfileFapi20Security captures enum value "fapi_20_security" WorkspaceResponseProfileFapi20Security string = "fapi_20_security" // WorkspaceResponseProfileFapi20MessageSigning captures enum value "fapi_20_message_signing" WorkspaceResponseProfileFapi20MessageSigning string = "fapi_20_message_signing" // WorkspaceResponseProfileConnectID captures enum value "connect_id" WorkspaceResponseProfileConnectID string = "connect_id" )
const ( // WorkspaceResponseSubjectFormatHash captures enum value "hash" WorkspaceResponseSubjectFormatHash string = "hash" // WorkspaceResponseSubjectFormatLegacy captures enum value "legacy" WorkspaceResponseSubjectFormatLegacy string = "legacy" )
const ( // WorkspaceResponseTypeAdmin captures enum value "admin" WorkspaceResponseTypeAdmin string = "admin" // WorkspaceResponseTypeDeveloper captures enum value "developer" WorkspaceResponseTypeDeveloper string = "developer" // WorkspaceResponseTypeSystem captures enum value "system" WorkspaceResponseTypeSystem string = "system" // WorkspaceResponseTypeRegular captures enum value "regular" WorkspaceResponseTypeRegular string = "regular" // WorkspaceResponseTypeOrganization captures enum value "organization" WorkspaceResponseTypeOrganization string = "organization" )
const ( // WorkspaceRoleSubjectTypeIdentityPoolUser captures enum value "identity_pool_user" WorkspaceRoleSubjectTypeIdentityPoolUser string = "identity_pool_user" // WorkspaceRoleSubjectTypeIdp captures enum value "idp" WorkspaceRoleSubjectTypeIdp string = "idp" )
const ( // CDRArrangementSpecVersionV1 captures enum value "v1" CDRArrangementSpecVersionV1 string = "v1" )
const ( // CustomAppResponseTypePostDashAuthn captures enum value "post-authn" CustomAppResponseTypePostDashAuthn string = "post-authn" )
const ( // CustomAppTypePostDashAuthn captures enum value "post-authn" CustomAppTypePostDashAuthn string = "post-authn" )
const ( // GrantIdentityPoolRoleRequestRoleUserManager captures enum value "user_manager" GrantIdentityPoolRoleRequestRoleUserManager string = "user_manager" )
const ( // RevokeIdentityPoolRoleRequestRoleUserManager captures enum value "user_manager" RevokeIdentityPoolRoleRequestRoleUserManager string = "user_manager" )
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type ACR ¶
type ACR struct { // An authorization server (workspace) identifier holding the ACR. // Example: default // Required: true AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"` // If set to `true`, the ACR is disabled and can't be used Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // ACR unique identifier ID string `json:"id,omitempty" yaml:"id,omitempty"` // General purpose metadata Metadata map[string]interface{} `json:"metadata,omitempty" yaml:"metadata,omitempty"` // ID of the tenant // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // ACR value // Must be unique within the server and contains only the following characters: `a-zA-Z0-9\/:=._-` // Example: urn:secureauth:factor:password // Required: true Value string `json:"value" yaml:"value"` }
ACR ACR
swagger:model ACR
func (*ACR) ContextValidate ¶
ContextValidate validates this a c r based on context it is used
func (*ACR) MarshalBinary ¶
MarshalBinary interface implementation
func (*ACR) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type ACRs ¶
type ACRs struct { // list of ACRs Acrs []*ACR `json:"acrs" yaml:"acrs"` }
ACRs a c rs
swagger:model ACRs
func (*ACRs) ContextValidate ¶
ContextValidate validate this a c rs based on the context it is used
func (*ACRs) MarshalBinary ¶
MarshalBinary interface implementation
func (*ACRs) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type API ¶
type API struct { // api type // Example: rest // Enum: ["rest","graphql"] APIType string `json:"api_type,omitempty" yaml:"api_type,omitempty"` // if false it is not possible to assign a policy CanHavePolicy bool `json:"can_have_policy,omitempty" yaml:"can_have_policy,omitempty"` // Data classifications DataClassifications []string `json:"data_classifications" yaml:"data_classifications"` // graphql schema GraphqlSchema string `json:"graphql_schema,omitempty" yaml:"graphql_schema,omitempty"` // graphql types GraphqlTypes GraphQLTypes `json:"graphql_types,omitempty" yaml:"graphql_types,omitempty"` // API id // Example: 1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // HTTP request method // Example: GET Method string `json:"method,omitempty" yaml:"method,omitempty"` // HTTP request path // Example: /pets Path string `json:"path,omitempty" yaml:"path,omitempty"` // optional id of a policy // Example: block PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"` // position of the api in the apis list // Example: 1 Position int64 `json:"position,omitempty" yaml:"position,omitempty"` // server id // Example: default ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // service id // Example: 1 ServiceID string `json:"service_id,omitempty" yaml:"service_id,omitempty"` // tenant id // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` }
API API
swagger:model API
func (*API) ContextValidate ¶
ContextValidate validate this API based on the context it is used
func (*API) MarshalBinary ¶
MarshalBinary interface implementation
func (*API) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type APIGroupMetadata ¶
type APIGroupMetadata struct { // apigee Apigee *ApigeeMetadata `json:"apigee,omitempty" yaml:"apigee,omitempty"` // aws Aws *AWSMetadata `json:"aws,omitempty" yaml:"aws,omitempty"` // azure Azure *AzureMetadata `json:"azure,omitempty" yaml:"azure,omitempty"` // Gateway type Type string `json:"type,omitempty" yaml:"type,omitempty"` }
APIGroupMetadata API group metadata
swagger:model APIGroupMetadata
func (*APIGroupMetadata) ContextValidate ¶
ContextValidate validate this API group metadata based on the context it is used
func (*APIGroupMetadata) MarshalBinary ¶
func (m *APIGroupMetadata) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*APIGroupMetadata) UnmarshalBinary ¶
func (m *APIGroupMetadata) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type APIs ¶
type APIs struct { // apis Apis []*API `json:"apis" yaml:"apis"` }
APIs a p is
swagger:model APIs
func (*APIs) ContextValidate ¶
ContextValidate validate this a p is based on the context it is used
func (*APIs) MarshalBinary ¶
MarshalBinary interface implementation
func (*APIs) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type AWSMetadata ¶
type AWSMetadata struct { // api id APIID string `json:"api_id,omitempty" yaml:"api_id,omitempty"` // api name APIName string `json:"api_name,omitempty" yaml:"api_name,omitempty"` // stage Stage string `json:"stage,omitempty" yaml:"stage,omitempty"` }
AWSMetadata a w s metadata
swagger:model AWSMetadata
func (*AWSMetadata) ContextValidate ¶
ContextValidate validates this a w s metadata based on context it is used
func (*AWSMetadata) MarshalBinary ¶
func (m *AWSMetadata) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AWSMetadata) UnmarshalBinary ¶
func (m *AWSMetadata) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AccessRequestData ¶
type AccessRequestData struct { // Actor claims ActorClaims map[string]interface{} `json:"actor_claims,omitempty" yaml:"actor_claims,omitempty"` // ID of the User in Identity Pool that is affected by an action AffectedUserID string `json:"affected_user_id,omitempty" yaml:"affected_user_id,omitempty"` // ID of the Identity Pool of the User that is affected by an action AffectedUserPoolID string `json:"affected_user_pool_id,omitempty" yaml:"affected_user_pool_id,omitempty"` // The authentication mechanisms a user used to login. AuthenticationMechanisms []string `json:"authentication_mechanisms" yaml:"authentication_mechanisms"` // OAuth client application identifier. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // Human readable name of a client application ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"` // Stores information if the owner of the client application is a developer. CreatedByDeveloper bool `json:"created_by_developer,omitempty" yaml:"created_by_developer,omitempty"` // Arculix DBFP `jwt` cookie. Dbfp string `json:"dbfp,omitempty" yaml:"dbfp,omitempty"` // Stores the information which grant type was selected to perfom a given action. // Matches one of allowed OAuth client grant types for a given client. GrantType string `json:"grant_type,omitempty" yaml:"grant_type,omitempty"` // ID of the Identity Pool IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // IDP identifier IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"` // IDP method IdpMethod string `json:"idp_method,omitempty" yaml:"idp_method,omitempty"` // Subject within the Identity Provider IdpSubject string `json:"idp_subject,omitempty" yaml:"idp_subject,omitempty"` // The visitor's latitude obtained from cf-iplatitude cloudflare header Latitude string `json:"latitude,omitempty" yaml:"latitude,omitempty"` // The visitor's longitude obtained from cf-iplongitude cloudflare header Longitude string `json:"longitude,omitempty" yaml:"longitude,omitempty"` // May act claims MayActClaims map[string]interface{} `json:"may_act_claims,omitempty" yaml:"may_act_claims,omitempty"` // ID of the Organization OrganizationID string `json:"organization_id,omitempty" yaml:"organization_id,omitempty"` // Stores information if the client application is a public one. Public bool `json:"public,omitempty" yaml:"public,omitempty"` // True if user had to do login recovery during authentication Recovery bool `json:"recovery,omitempty" yaml:"recovery,omitempty"` // Requester IP address obtained from system network socket information. RemoteAddr string `json:"remote_addr,omitempty" yaml:"remote_addr,omitempty"` // risk engine context RiskEngineContext *RiskContext `json:"risk_engine_context,omitempty" yaml:"risk_engine_context,omitempty"` // ID of the authorization server (workspace) to which an access request is tied. ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // Session id of a given subject. It's uniform across the authentication processes. // It can be used as a correlation ID between a different audit events. SessionID string `json:"session_id,omitempty" yaml:"session_id,omitempty"` // Identification of the principal that is the subject of authorization. // For the authorization grant, the subject typically identifies an authorized accessor for which the access token is being requested. // For client authentication, the subject is the client_id of the OAuth client. Subject string `json:"subject,omitempty" yaml:"subject,omitempty"` // Stores information if the client application is a system tenant's application. System bool `json:"system,omitempty" yaml:"system,omitempty"` // Token endpoint authentication method configured for a client application. // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none","unspecified"] TokenEndpointAuthnMethod string `json:"token_endpoint_authn_method,omitempty" yaml:"token_endpoint_authn_method,omitempty"` // Token signature TokenSignature string `json:"token_signature,omitempty" yaml:"token_signature,omitempty"` // Requester IP address obtained from True-Client-IP header. TrueClientIP string `json:"true_client_ip,omitempty" yaml:"true_client_ip,omitempty"` // A characteristic string that lets servers and network peers identify the application, operating system, vendor, and/or version of the requesting user agent. UserAgent string `json:"user_agent,omitempty" yaml:"user_agent,omitempty"` // ID of the User in Identity Pool UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"` // ID of the Identity Pool UserPoolID string `json:"user_pool_id,omitempty" yaml:"user_pool_id,omitempty"` // ID of the authorization server (workspace) to which a resource is tied. WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` // Requester IP address obtained from X-Forwarded-For header. XForwardedFor string `json:"x_forwarded_for,omitempty" yaml:"x_forwarded_for,omitempty"` // Requester IP address obtained from X-Real-IP header. XRealIP string `json:"x_real_ip,omitempty" yaml:"x_real_ip,omitempty"` }
AccessRequestData access request data
swagger:model AccessRequestData
func (*AccessRequestData) ContextValidate ¶
ContextValidate validate this access request data based on the context it is used
func (*AccessRequestData) MarshalBinary ¶
func (m *AccessRequestData) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AccessRequestData) UnmarshalBinary ¶
func (m *AccessRequestData) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AccessRequestDataWithError ¶
type AccessRequestDataWithError struct { // Actor claims ActorClaims map[string]interface{} `json:"actor_claims,omitempty" yaml:"actor_claims,omitempty"` // ID of the User in Identity Pool that is affected by an action AffectedUserID string `json:"affected_user_id,omitempty" yaml:"affected_user_id,omitempty"` // ID of the Identity Pool of the User that is affected by an action AffectedUserPoolID string `json:"affected_user_pool_id,omitempty" yaml:"affected_user_pool_id,omitempty"` // The authentication mechanisms a user used to login. AuthenticationMechanisms []string `json:"authentication_mechanisms" yaml:"authentication_mechanisms"` // OAuth client application identifier. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // Human readable name of a client application ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"` // Stores information if the owner of the client application is a developer. CreatedByDeveloper bool `json:"created_by_developer,omitempty" yaml:"created_by_developer,omitempty"` // Arculix DBFP `jwt` cookie. Dbfp string `json:"dbfp,omitempty" yaml:"dbfp,omitempty"` // High level error name (request_forbidden, access_denied, invalid_request). Error string `json:"error,omitempty" yaml:"error,omitempty"` // Error root cause (invalid_pkce, invalid_state, user_policy_failed). ErrorCause string `json:"error_cause,omitempty" yaml:"error_cause,omitempty"` // Human readable error description ErrorDescription string `json:"error_description,omitempty" yaml:"error_description,omitempty"` // Error hint ErrorHint string `json:"error_hint,omitempty" yaml:"error_hint,omitempty"` // External error ExternalError bool `json:"external_error,omitempty" yaml:"external_error,omitempty"` // Stores the information which grant type was selected to perfom a given action. // Matches one of allowed OAuth client grant types for a given client. GrantType string `json:"grant_type,omitempty" yaml:"grant_type,omitempty"` // ID of the Identity Pool IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // IDP identifier IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"` // IDP method IdpMethod string `json:"idp_method,omitempty" yaml:"idp_method,omitempty"` // Subject within the Identity Provider IdpSubject string `json:"idp_subject,omitempty" yaml:"idp_subject,omitempty"` // The visitor's latitude obtained from cf-iplatitude cloudflare header Latitude string `json:"latitude,omitempty" yaml:"latitude,omitempty"` // The visitor's longitude obtained from cf-iplongitude cloudflare header Longitude string `json:"longitude,omitempty" yaml:"longitude,omitempty"` // May act claims MayActClaims map[string]interface{} `json:"may_act_claims,omitempty" yaml:"may_act_claims,omitempty"` // ID of the Organization OrganizationID string `json:"organization_id,omitempty" yaml:"organization_id,omitempty"` // Stores information if the client application is a public one. Public bool `json:"public,omitempty" yaml:"public,omitempty"` // True if user had to do login recovery during authentication Recovery bool `json:"recovery,omitempty" yaml:"recovery,omitempty"` // Requester IP address obtained from system network socket information. RemoteAddr string `json:"remote_addr,omitempty" yaml:"remote_addr,omitempty"` // risk engine context RiskEngineContext *RiskContext `json:"risk_engine_context,omitempty" yaml:"risk_engine_context,omitempty"` // ID of the authorization server (workspace) to which an access request is tied. ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // Session id of a given subject. It's uniform across the authentication processes. // It can be used as a correlation ID between a different audit events. SessionID string `json:"session_id,omitempty" yaml:"session_id,omitempty"` // Identification of the principal that is the subject of authorization. // For the authorization grant, the subject typically identifies an authorized accessor for which the access token is being requested. // For client authentication, the subject is the client_id of the OAuth client. Subject string `json:"subject,omitempty" yaml:"subject,omitempty"` // Stores information if the client application is a system tenant's application. System bool `json:"system,omitempty" yaml:"system,omitempty"` // Token endpoint authentication method configured for a client application. // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none","unspecified"] TokenEndpointAuthnMethod string `json:"token_endpoint_authn_method,omitempty" yaml:"token_endpoint_authn_method,omitempty"` // Token signature TokenSignature string `json:"token_signature,omitempty" yaml:"token_signature,omitempty"` // Requester IP address obtained from True-Client-IP header. TrueClientIP string `json:"true_client_ip,omitempty" yaml:"true_client_ip,omitempty"` // A characteristic string that lets servers and network peers identify the application, operating system, vendor, and/or version of the requesting user agent. UserAgent string `json:"user_agent,omitempty" yaml:"user_agent,omitempty"` // ID of the User in Identity Pool UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"` // ID of the Identity Pool UserPoolID string `json:"user_pool_id,omitempty" yaml:"user_pool_id,omitempty"` // ID of the authorization server (workspace) to which a resource is tied. WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` // Requester IP address obtained from X-Forwarded-For header. XForwardedFor string `json:"x_forwarded_for,omitempty" yaml:"x_forwarded_for,omitempty"` // Requester IP address obtained from X-Real-IP header. XRealIP string `json:"x_real_ip,omitempty" yaml:"x_real_ip,omitempty"` }
AccessRequestDataWithError access request data with error
swagger:model AccessRequestDataWithError
func (*AccessRequestDataWithError) ContextValidate ¶
func (m *AccessRequestDataWithError) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this access request data with error based on the context it is used
func (*AccessRequestDataWithError) MarshalBinary ¶
func (m *AccessRequestDataWithError) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AccessRequestDataWithError) UnmarshalBinary ¶
func (m *AccessRequestDataWithError) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AdvancedConfiguration ¶
type AdvancedConfiguration struct { // Configurable ACR values to enforce during auth flow AcrValues []string `json:"acr_values" yaml:"acr_values"` // This option overrides all urls advertised by the well known endpoint with their mtls alias AdvertiseOnlyMtlsAliasesInWellKnown bool `json:"advertise_only_mtls_aliases_in_well_known,omitempty" yaml:"advertise_only_mtls_aliases_in_well_known,omitempty"` // Block response modes BlockResponseModes bool `json:"block_response_modes,omitempty" yaml:"block_response_modes,omitempty"` // cookies configuration CookiesConfiguration *CookiesConfiguration `json:"cookies_configuration,omitempty" yaml:"cookies_configuration,omitempty"` // Disable certificate-bound access tokens for new DCR clients // // If true, new DCR clients are created with CertificateBoundAccessToken disabled. DisableDcrClientCertificateBoundAccessTokens bool `` /* 135-byte string literal not displayed */ // Disable PAR DisablePar bool `json:"disable_par,omitempty" yaml:"disable_par,omitempty"` // Disable RAR DisableRar bool `json:"disable_rar,omitempty" yaml:"disable_rar,omitempty"` // Disable refresh token cycling // // Once disabled, original refresh token can be constantly used to issue new access token. DisableRefreshTokenCycling bool `json:"disable_refresh_token_cycling,omitempty" yaml:"disable_refresh_token_cycling,omitempty"` // When enabled, the authorization server will not accept access tokens supplied in the request query parameter // for protected resources endpoints. DisallowAccessTokenInQueryForProtectedResources bool `` /* 143-byte string literal not displayed */ // Disallow code response type without JARM DisallowCodeResponseTypeWithoutJarm bool `json:"disallow_code_response_type_without_jarm,omitempty" yaml:"disallow_code_response_type_without_jarm,omitempty"` // disallowed response modes DisallowedResponseModes ResponseModes `json:"disallowed_response_modes,omitempty" yaml:"disallowed_response_modes,omitempty"` // Do not issue acr claim in ID Token DoNotIssueAcrClaimInIDToken bool `json:"do_not_issue_acr_claim_in_id_token,omitempty" yaml:"do_not_issue_acr_claim_in_id_token,omitempty"` // Enforce acr values EnforceAcrValues bool `json:"enforce_acr_values,omitempty" yaml:"enforce_acr_values,omitempty"` // Ignore unknown scopes for DCR // // If enabled, an attempt to register or update a client with a scope that does not exist in the server will succeed. IgnoreUnknownScopesForDcr bool `json:"ignore_unknown_scopes_for_dcr,omitempty" yaml:"ignore_unknown_scopes_for_dcr,omitempty"` // Require request or request uri parameter for authorization flow RequireRequestOrRequestURIParameter bool `json:"require_request_or_request_uri_parameter,omitempty" yaml:"require_request_or_request_uri_parameter,omitempty"` // Return iss parameter in the authorization response ReturnIssParameterInAuthorizationResponse bool `` /* 127-byte string literal not displayed */ // Disables SSO as a fallback mechanism for post-logout redirect URI validation StrictPostLogoutRedirectEnforcement bool `json:"strict_post_logout_redirect_enforcement,omitempty" yaml:"strict_post_logout_redirect_enforcement,omitempty"` }
AdvancedConfiguration advanced configuration
swagger:model AdvancedConfiguration
func (*AdvancedConfiguration) ContextValidate ¶
ContextValidate validate this advanced configuration based on the context it is used
func (*AdvancedConfiguration) MarshalBinary ¶
func (m *AdvancedConfiguration) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AdvancedConfiguration) UnmarshalBinary ¶
func (m *AdvancedConfiguration) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AffiliationDescriptor ¶
type AffiliationDescriptor struct { // affiliate members AffiliateMembers []string `json:"AffiliateMembers" yaml:"AffiliateMembers"` // affiliation owner ID AffiliationOwnerID string `json:"AffiliationOwnerID,omitempty" yaml:"AffiliationOwnerID,omitempty"` // cache duration CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"` // ID ID string `json:"ID,omitempty" yaml:"ID,omitempty"` // key descriptors KeyDescriptors []*KeyDescriptor `json:"KeyDescriptors" yaml:"KeyDescriptors"` // signature Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"` // valid until // Format: date-time ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"` }
AffiliationDescriptor AffiliationDescriptor represents the SAML AffiliationDescriptor object.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.5
swagger:model AffiliationDescriptor
func (*AffiliationDescriptor) ContextValidate ¶
ContextValidate validate this affiliation descriptor based on the context it is used
func (*AffiliationDescriptor) MarshalBinary ¶
func (m *AffiliationDescriptor) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AffiliationDescriptor) UnmarshalBinary ¶
func (m *AffiliationDescriptor) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ApigeeMetadata ¶
type ApigeeMetadata struct { // Apigee environment name. It's a uniqe, immutable name of an environment for a given proxy name. // Example: my-default-proxy // Required: true EnvironmentName string `json:"environment_name" yaml:"environment_name"` // Apigee organization name. It's a uniqe, immutable name of an Apigee organization. // Example: apigee-x-905913 // Required: true OrganizationName string `json:"organization_name" yaml:"organization_name"` // Apigee proxy name. It's a uniqe, immutable name of a proxy for a given organization id. // Example: my-default-proxy // Required: true ProxyName string `json:"proxy_name" yaml:"proxy_name"` }
ApigeeMetadata apigee metadata
swagger:model ApigeeMetadata
func (*ApigeeMetadata) ContextValidate ¶
ContextValidate validates this apigee metadata based on context it is used
func (*ApigeeMetadata) MarshalBinary ¶
func (m *ApigeeMetadata) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ApigeeMetadata) UnmarshalBinary ¶
func (m *ApigeeMetadata) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ArculixAuth ¶
type ArculixAuth struct { // The Arculix client ID. // Required: true ClientID string `json:"client_id" yaml:"client_id"` // The Arculix client secret. // Required: true ClientSecret string `json:"client_secret" yaml:"client_secret"` }
ArculixAuth arculix auth
swagger:model ArculixAuth
func (*ArculixAuth) ContextValidate ¶
ContextValidate validates this arculix auth based on context it is used
func (*ArculixAuth) MarshalBinary ¶
func (m *ArculixAuth) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ArculixAuth) UnmarshalBinary ¶
func (m *ArculixAuth) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Attr ¶
type Attr struct { // space Space string `json:"Space,omitempty" yaml:"Space,omitempty"` // value Value string `json:"Value,omitempty" yaml:"Value,omitempty"` }
Attr An Attr represents a key-value attribute within an XML element.
swagger:model Attr
func (*Attr) ContextValidate ¶
ContextValidate validates this attr based on context it is used
func (*Attr) MarshalBinary ¶
MarshalBinary interface implementation
func (*Attr) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type Attribute ¶
type Attribute struct { // friendly name FriendlyName string `json:"FriendlyName,omitempty" yaml:"FriendlyName,omitempty"` // name Name string `json:"Name,omitempty" yaml:"Name,omitempty"` // name format NameFormat string `json:"NameFormat,omitempty" yaml:"NameFormat,omitempty"` // values Values []*AttributeValue `json:"Values" yaml:"Values"` }
Attribute Attribute represents the SAML element Attribute.
See http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf §2.7.3.1
swagger:model Attribute
func (*Attribute) ContextValidate ¶
ContextValidate validate this attribute based on the context it is used
func (*Attribute) MarshalBinary ¶
MarshalBinary interface implementation
func (*Attribute) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type AttributeAuthorityDescriptor ¶
type AttributeAuthorityDescriptor struct { // assertion ID request services AssertionIDRequestServices []*Endpoint `json:"AssertionIDRequestServices" yaml:"AssertionIDRequestServices"` // attribute profiles AttributeProfiles []string `json:"AttributeProfiles" yaml:"AttributeProfiles"` // attribute services AttributeServices []*Endpoint `json:"AttributeServices" yaml:"AttributeServices"` // attributes Attributes []*Attribute `json:"Attributes" yaml:"Attributes"` // cache duration CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"` // contact people ContactPeople []*ContactPerson `json:"ContactPeople" yaml:"ContactPeople"` // error URL ErrorURL string `json:"ErrorURL,omitempty" yaml:"ErrorURL,omitempty"` // ID ID string `json:"ID,omitempty" yaml:"ID,omitempty"` // key descriptors KeyDescriptors []*KeyDescriptor `json:"KeyDescriptors" yaml:"KeyDescriptors"` // name ID formats NameIDFormats []NameIDFormat `json:"NameIDFormats" yaml:"NameIDFormats"` // organization Organization *Organization `json:"Organization,omitempty" yaml:"Organization,omitempty"` // protocol support enumeration ProtocolSupportEnumeration string `json:"ProtocolSupportEnumeration,omitempty" yaml:"ProtocolSupportEnumeration,omitempty"` // signature Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"` // valid until // Format: date-time ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"` }
AttributeAuthorityDescriptor AttributeAuthorityDescriptor represents the SAML AttributeAuthorityDescriptor object.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.7
swagger:model AttributeAuthorityDescriptor
func (*AttributeAuthorityDescriptor) ContextValidate ¶
func (m *AttributeAuthorityDescriptor) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this attribute authority descriptor based on the context it is used
func (*AttributeAuthorityDescriptor) MarshalBinary ¶
func (m *AttributeAuthorityDescriptor) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AttributeAuthorityDescriptor) UnmarshalBinary ¶
func (m *AttributeAuthorityDescriptor) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AttributeConsumingService ¶
type AttributeConsumingService struct { // index Index int64 `json:"Index,omitempty" yaml:"Index,omitempty"` // is default IsDefault bool `json:"IsDefault,omitempty" yaml:"IsDefault,omitempty"` // requested attributes RequestedAttributes []*RequestedAttribute `json:"RequestedAttributes" yaml:"RequestedAttributes"` // service descriptions ServiceDescriptions []*LocalizedName `json:"ServiceDescriptions" yaml:"ServiceDescriptions"` // service names ServiceNames []*LocalizedName `json:"ServiceNames" yaml:"ServiceNames"` }
AttributeConsumingService AttributeConsumingService represents the SAML AttributeConsumingService object.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.4.1
swagger:model AttributeConsumingService
func (*AttributeConsumingService) ContextValidate ¶
func (m *AttributeConsumingService) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this attribute consuming service based on the context it is used
func (*AttributeConsumingService) MarshalBinary ¶
func (m *AttributeConsumingService) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AttributeConsumingService) UnmarshalBinary ¶
func (m *AttributeConsumingService) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AttributeValue ¶
type AttributeValue struct { // name ID NameID *NameID `json:"NameID,omitempty" yaml:"NameID,omitempty"` // type Type string `json:"Type,omitempty" yaml:"Type,omitempty"` // value Value string `json:"Value,omitempty" yaml:"Value,omitempty"` }
AttributeValue AttributeValue represents the SAML element AttributeValue.
See http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf §2.7.3.1.1
swagger:model AttributeValue
func (*AttributeValue) ContextValidate ¶
ContextValidate validate this attribute value based on the context it is used
func (*AttributeValue) MarshalBinary ¶
func (m *AttributeValue) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AttributeValue) UnmarshalBinary ¶
func (m *AttributeValue) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Attributes ¶
type Attributes []*AuthenticationContextAttribute
Attributes attributes
swagger:model Attributes
func (Attributes) ContextValidate ¶
ContextValidate validate this attributes based on the context it is used
type AuditConsentKind ¶
type AuditConsentKind string
AuditConsentKind audit consent kind
swagger:model AuditConsentKind
func (AuditConsentKind) ContextValidate ¶
ContextValidate validates this audit consent kind based on context it is used
type AuditEvent ¶
type AuditEvent struct { // Name of an action that was performed for a given event subject. // Example: created // Enum: ["authenticated","challenged","authorized","unauthorized","created","updated","deleted","generated","requested","confirmed","accepted","rejected","revoked","notified","issued","denied","granted","attempted","failed","succeeded","sent","not_sent","executed","reset_requested","reset_completed","add_requested","add_completed"] Action string `json:"action,omitempty" yaml:"action,omitempty"` // Additional audit event context. Context map[string]string `json:"context,omitempty" yaml:"context,omitempty"` // Event ID - unique audit event identifier. EventID string `json:"event_id,omitempty" yaml:"event_id,omitempty"` // Resource or entity that is a subject of a given audit event. // Example: client // Enum: ["request","gateway_request","gateway_policy","policy","client","credential","login","post_authn","recovery","consent","client_consents","customer_consents","authorization_code","access_token","saml_assertion","scopes","claims","otp","user","schema","pool","password","bruteforce","dcr","script","role","task","jit","tokens","service","server","import","organization","otp_inspect","totp","webauthn"] EventSubject string `json:"event_subject,omitempty" yaml:"event_subject,omitempty"` // metadata Metadata *AuditEventMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // payload Payload *AuditEventPayloads `json:"payload,omitempty" yaml:"payload,omitempty"` // Server ID. ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // Tenant ID. TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // Time when the event took place. // Format: date-time Timestamp strfmt.DateTime `json:"timestamp,omitempty" yaml:"timestamp,omitempty"` }
AuditEvent audit event
swagger:model AuditEvent
func (*AuditEvent) ContextValidate ¶
ContextValidate validate this audit event based on the context it is used
func (*AuditEvent) MarshalBinary ¶
func (m *AuditEvent) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AuditEvent) UnmarshalBinary ¶
func (m *AuditEvent) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AuditEventMetadata ¶
type AuditEventMetadata struct { // Access request actor claims. // // It's only populated if the token has been issued in token exchange delegation flow. ActorClaims map[string]interface{} `json:"actor_claims,omitempty" yaml:"actor_claims,omitempty"` // ID of the User in Identity Pool that is affected by an action AffectedUserID string `json:"affected_user_id,omitempty" yaml:"affected_user_id,omitempty"` // ID of the Identity Pool of the User that is affected by an action AffectedUserPoolID string `json:"affected_user_pool_id,omitempty" yaml:"affected_user_pool_id,omitempty"` // Authorization correlation ID // // Represents the correlation ID used for the OAuth2 authorization code grant flow. AuthorizationCorrelationID string `json:"authorization_correlation_id,omitempty" yaml:"authorization_correlation_id,omitempty"` // Access request client ID related to an audit event. // // May be empty when the access is incorrect or missing. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // DBFP jwt fingerprint DbfpFingerprint string `json:"dbfp_fingerprint,omitempty" yaml:"dbfp_fingerprint,omitempty"` // ID of the Identity Pool IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // IDP identifier IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"` // IDP method IdpMethod string `json:"idp_method,omitempty" yaml:"idp_method,omitempty"` // Access request subject value from IDP related to a given audit event. // // May be empty when the access is incorrect or missing. IdpSubject string `json:"idp_subject,omitempty" yaml:"idp_subject,omitempty"` // Audit event IP address. // // It's first not empty value from: X-Forwaded-For, X-Real-IP or network socket IP address IP string `json:"ip,omitempty" yaml:"ip,omitempty"` // Access request may act claims. // // It's only populated if the token has been issued token with may_act claim. MayActClaims map[string]interface{} `json:"may_act_claims,omitempty" yaml:"may_act_claims,omitempty"` // ID of the Organization OrganizationID string `json:"organization_id,omitempty" yaml:"organization_id,omitempty"` // Request correlation ID // // Represents the correlation ID passed as X-Correlation-ID header to a HTTP request RequestCorrelationID string `json:"request_correlation_id,omitempty" yaml:"request_correlation_id,omitempty"` // risk id RiskID RiskID `json:"risk_id,omitempty" yaml:"risk_id,omitempty"` // risk loa RiskLoa RiskLOA `json:"risk_loa,omitempty" yaml:"risk_loa,omitempty"` // Session id // // Correlation ID in a login process. Returns events related to a particular login process. // It's empty for audit events that have been created outside login process. SessionID string `json:"session_id,omitempty" yaml:"session_id,omitempty"` // Access request subject ID related to a given audit event. // // May be empty when the access is incorrect or missing. Subject string `json:"subject,omitempty" yaml:"subject,omitempty"` // Token signature // // Signature of a token that was used to perform an action that has published an audit event. TokenSignature string `json:"token_signature,omitempty" yaml:"token_signature,omitempty"` // Trace ID TraceID string `json:"trace_id,omitempty" yaml:"trace_id,omitempty"` // User-agent that describes a device name that generated the audit event. UserAgent string `json:"user_agent,omitempty" yaml:"user_agent,omitempty"` // ID of the User in Identity Pool UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"` // ID of the Identity Pool UserPoolID string `json:"user_pool_id,omitempty" yaml:"user_pool_id,omitempty"` }
AuditEventMetadata audit event metadata
swagger:model AuditEventMetadata
func (*AuditEventMetadata) ContextValidate ¶
ContextValidate validate this audit event metadata based on the context it is used
func (*AuditEventMetadata) MarshalBinary ¶
func (m *AuditEventMetadata) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AuditEventMetadata) UnmarshalBinary ¶
func (m *AuditEventMetadata) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AuditEventPayloads ¶
type AuditEventPayloads struct { // access token denied AccessTokenDenied *AccessRequestDataWithError `json:"access_token_denied,omitempty" yaml:"access_token_denied,omitempty"` // access token issued AccessTokenIssued *AccessRequestData `json:"access_token_issued,omitempty" yaml:"access_token_issued,omitempty"` // authorization code denied AuthorizationCodeDenied *AccessRequestDataWithError `json:"authorization_code_denied,omitempty" yaml:"authorization_code_denied,omitempty"` // authorization code issued AuthorizationCodeIssued *AccessRequestData `json:"authorization_code_issued,omitempty" yaml:"authorization_code_issued,omitempty"` // bruteforce deleted BruteforceDeleted *BruteForceLimit `json:"bruteforce_deleted,omitempty" yaml:"bruteforce_deleted,omitempty"` // bruteforce updated BruteforceUpdated *BruteForceLimit `json:"bruteforce_updated,omitempty" yaml:"bruteforce_updated,omitempty"` // claims granted ClaimsGranted *ClaimsGrantedPayload `json:"claims_granted,omitempty" yaml:"claims_granted,omitempty"` // client consents revoked ClientConsentsRevoked *ClientConsentsAuditEventPayload `json:"client_consents_revoked,omitempty" yaml:"client_consents_revoked,omitempty"` // client created ClientCreated *ClientAuditPayload `json:"client_created,omitempty" yaml:"client_created,omitempty"` // client deleted ClientDeleted *ClientAuditPayload `json:"client_deleted,omitempty" yaml:"client_deleted,omitempty"` // client updated ClientUpdated *ClientAuditPayload `json:"client_updated,omitempty" yaml:"client_updated,omitempty"` // consent accepted ConsentAccepted *ConsentAuditEventPayload `json:"consent_accepted,omitempty" yaml:"consent_accepted,omitempty"` // consent created ConsentCreated *ConsentAuditEventPayload `json:"consent_created,omitempty" yaml:"consent_created,omitempty"` // consent notified ConsentNotified *ConsentNotifiedPayload `json:"consent_notified,omitempty" yaml:"consent_notified,omitempty"` // consent rejected ConsentRejected *ConsentAuditEventPayload `json:"consent_rejected,omitempty" yaml:"consent_rejected,omitempty"` // consent revoked ConsentRevoked *ConsentAuditEventPayload `json:"consent_revoked,omitempty" yaml:"consent_revoked,omitempty"` // consent updated ConsentUpdated *ConsentAuditEventPayload `json:"consent_updated,omitempty" yaml:"consent_updated,omitempty"` // credential created CredentialCreated *CredentialPayload `json:"credential_created,omitempty" yaml:"credential_created,omitempty"` // credential updated CredentialUpdated *CredentialPayload `json:"credential_updated,omitempty" yaml:"credential_updated,omitempty"` // customer consents revoked CustomerConsentsRevoked *CustomerConsentsAuditEventPayload `json:"customer_consents_revoked,omitempty" yaml:"customer_consents_revoked,omitempty"` // dcr created DcrCreated *DCRCreatedEventPayload `json:"dcr_created,omitempty" yaml:"dcr_created,omitempty"` // dcr rejected DcrRejected *DCRRejectedEventPayload `json:"dcr_rejected,omitempty" yaml:"dcr_rejected,omitempty"` // gateway policy authorized GatewayPolicyAuthorized *RequestValidatedPayload `json:"gateway_policy_authorized,omitempty" yaml:"gateway_policy_authorized,omitempty"` GatewayPolicyUnauthorized *RequestValidatedPayload `json:"gateway_policy_unauthorized,omitempty" yaml:"gateway_policy_unauthorized,omitempty"` // gateway request authorized GatewayRequestAuthorized *RequestValidatedPayload `json:"gateway_request_authorized,omitempty" yaml:"gateway_request_authorized,omitempty"` GatewayRequestUnauthorized *RequestValidatedPayload `json:"gateway_request_unauthorized,omitempty" yaml:"gateway_request_unauthorized,omitempty"` // import created ImportCreated *ConfigImportEventPayload `json:"import_created,omitempty" yaml:"import_created,omitempty"` // import failed ImportFailed *ConfigImportEventPayload `json:"import_failed,omitempty" yaml:"import_failed,omitempty"` // jit created JitCreated *JITCreatedPayload `json:"jit_created,omitempty" yaml:"jit_created,omitempty"` // jit failed JitFailed *JITFailedPayload `json:"jit_failed,omitempty" yaml:"jit_failed,omitempty"` // jit updated JitUpdated *JITUpdatedPayload `json:"jit_updated,omitempty" yaml:"jit_updated,omitempty"` // login accepted LoginAccepted *LoginPayload `json:"login_accepted,omitempty" yaml:"login_accepted,omitempty"` // login attempted LoginAttempted *LoginPayload `json:"login_attempted,omitempty" yaml:"login_attempted,omitempty"` // login failed LoginFailed *LoginFailedPayload `json:"login_failed,omitempty" yaml:"login_failed,omitempty"` // organization created OrganizationCreated *Org `json:"organization_created,omitempty" yaml:"organization_created,omitempty"` // organization deleted OrganizationDeleted *Org `json:"organization_deleted,omitempty" yaml:"organization_deleted,omitempty"` // organization updated OrganizationUpdated *Org `json:"organization_updated,omitempty" yaml:"organization_updated,omitempty"` // otp accepted OtpAccepted *OTPPayload `json:"otp_accepted,omitempty" yaml:"otp_accepted,omitempty"` // otp generated OtpGenerated *OTPPayload `json:"otp_generated,omitempty" yaml:"otp_generated,omitempty"` // otp inspect failed OtpInspectFailed *OTPPayload `json:"otp_inspect_failed,omitempty" yaml:"otp_inspect_failed,omitempty"` // otp inspect succeeded OtpInspectSucceeded *OTPPayload `json:"otp_inspect_succeeded,omitempty" yaml:"otp_inspect_succeeded,omitempty"` // otp not sent OtpNotSent *OTPPayload `json:"otp_not_sent,omitempty" yaml:"otp_not_sent,omitempty"` // otp rejected OtpRejected *OTPPayload `json:"otp_rejected,omitempty" yaml:"otp_rejected,omitempty"` // otp requested OtpRequested *OTPPayload `json:"otp_requested,omitempty" yaml:"otp_requested,omitempty"` // otp sent OtpSent *OTPPayload `json:"otp_sent,omitempty" yaml:"otp_sent,omitempty"` // password accepted PasswordAccepted *UserIDAndIdentifierPayload `json:"password_accepted,omitempty" yaml:"password_accepted,omitempty"` // password confirmed PasswordConfirmed *UserIDAndIdentifierPayload `json:"password_confirmed,omitempty" yaml:"password_confirmed,omitempty"` // password rejected PasswordRejected *UserIDAndIdentifierPayload `json:"password_rejected,omitempty" yaml:"password_rejected,omitempty"` // password requested PasswordRequested *UserIDAndIdentifierPayload `json:"password_requested,omitempty" yaml:"password_requested,omitempty"` // password updated PasswordUpdated *UserIDAndIdentifierPayload `json:"password_updated,omitempty" yaml:"password_updated,omitempty"` // policy authorized PolicyAuthorized *PolicyEvaluatedPayload `json:"policy_authorized,omitempty" yaml:"policy_authorized,omitempty"` PolicyUnauthorized *PolicyEvaluatedPayload `json:"policy_unauthorized,omitempty" yaml:"policy_unauthorized,omitempty"` // pool created PoolCreated *PoolAuditPayload `json:"pool_created,omitempty" yaml:"pool_created,omitempty"` // pool deleted PoolDeleted *PoolAuditPayload `json:"pool_deleted,omitempty" yaml:"pool_deleted,omitempty"` // pool updated PoolUpdated *PoolAuditPayload `json:"pool_updated,omitempty" yaml:"pool_updated,omitempty"` // recovery confirmed RecoveryConfirmed *RecoveryPayload `json:"recovery_confirmed,omitempty" yaml:"recovery_confirmed,omitempty"` // role granted RoleGranted *RoleGrantAuditPayload `json:"role_granted,omitempty" yaml:"role_granted,omitempty"` // role revoked RoleRevoked *RoleGrantAuditPayload `json:"role_revoked,omitempty" yaml:"role_revoked,omitempty"` // saml assertion denied SamlAssertionDenied *AccessRequestDataWithError `json:"saml_assertion_denied,omitempty" yaml:"saml_assertion_denied,omitempty"` // saml assertion issued SamlAssertionIssued *AccessRequestData `json:"saml_assertion_issued,omitempty" yaml:"saml_assertion_issued,omitempty"` // schema created SchemaCreated *SchemaAuditPayload `json:"schema_created,omitempty" yaml:"schema_created,omitempty"` // schema deleted SchemaDeleted *SchemaAuditPayload `json:"schema_deleted,omitempty" yaml:"schema_deleted,omitempty"` // schema updated SchemaUpdated *SchemaAuditPayload `json:"schema_updated,omitempty" yaml:"schema_updated,omitempty"` // scopes granted ScopesGranted *ScopesGrantedPayload `json:"scopes_granted,omitempty" yaml:"scopes_granted,omitempty"` // script executed ScriptExecuted *ScriptExecutionAuditPayload `json:"script_executed,omitempty" yaml:"script_executed,omitempty"` // server created ServerCreated *ServerAuditPayload `json:"server_created,omitempty" yaml:"server_created,omitempty"` // server deleted ServerDeleted *ServerAuditPayload `json:"server_deleted,omitempty" yaml:"server_deleted,omitempty"` // server updated ServerUpdated *ServerAuditPayload `json:"server_updated,omitempty" yaml:"server_updated,omitempty"` // service created ServiceCreated *ServiceAuditPayload `json:"service_created,omitempty" yaml:"service_created,omitempty"` // service deleted ServiceDeleted *ServiceAuditPayload `json:"service_deleted,omitempty" yaml:"service_deleted,omitempty"` // service updated ServiceUpdated *ServiceAuditPayload `json:"service_updated,omitempty" yaml:"service_updated,omitempty"` // task failed TaskFailed *TaskAuditPayload `json:"task_failed,omitempty" yaml:"task_failed,omitempty"` // task succeeded TaskSucceeded *TaskAuditPayload `json:"task_succeeded,omitempty" yaml:"task_succeeded,omitempty"` // tokens revoked TokensRevoked *TokensRevokedPayload `json:"tokens_revoked,omitempty" yaml:"tokens_revoked,omitempty"` // totp reset completed TotpResetCompleted *UserIDAndIdentifierPayload `json:"totp_reset_completed,omitempty" yaml:"totp_reset_completed,omitempty"` // totp reset requested TotpResetRequested *UserIDAndIdentifierPayload `json:"totp_reset_requested,omitempty" yaml:"totp_reset_requested,omitempty"` // user authenticated UserAuthenticated *UserAuthenticatedPayload `json:"user_authenticated,omitempty" yaml:"user_authenticated,omitempty"` // user challenged UserChallenged *UserAuthenticatedPayload `json:"user_challenged,omitempty" yaml:"user_challenged,omitempty"` // user created UserCreated *UserPayload `json:"user_created,omitempty" yaml:"user_created,omitempty"` // user deleted UserDeleted *UserPayload `json:"user_deleted,omitempty" yaml:"user_deleted,omitempty"` // user updated UserUpdated *UserPayload `json:"user_updated,omitempty" yaml:"user_updated,omitempty"` // webauthn add completed WebauthnAddCompleted *UserIDAndIdentifierPayload `json:"webauthn_add_completed,omitempty" yaml:"webauthn_add_completed,omitempty"` // webauthn add requested WebauthnAddRequested *UserIDAndIdentifierPayload `json:"webauthn_add_requested,omitempty" yaml:"webauthn_add_requested,omitempty"` }
AuditEventPayloads audit event payloads
swagger:model AuditEventPayloads
func (*AuditEventPayloads) ContextValidate ¶
ContextValidate validate this audit event payloads based on the context it is used
func (*AuditEventPayloads) MarshalBinary ¶
func (m *AuditEventPayloads) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AuditEventPayloads) UnmarshalBinary ¶
func (m *AuditEventPayloads) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AuditEvents ¶
type AuditEvents struct { // audit events AuditEvents []*AuditEvent `json:"audit_events" yaml:"audit_events"` }
AuditEvents audit events
swagger:model AuditEvents
func (*AuditEvents) ContextValidate ¶
ContextValidate validate this audit events based on the context it is used
func (*AuditEvents) MarshalBinary ¶
func (m *AuditEvents) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AuditEvents) UnmarshalBinary ¶
func (m *AuditEvents) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Auth0Credentials ¶
type Auth0Credentials struct { // OAuth client application secret ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"` }
Auth0Credentials Auth0 IDP specific credentials
swagger:model Auth0Credentials
func (*Auth0Credentials) ContextValidate ¶
ContextValidate validates this auth0 credentials based on context it is used
func (*Auth0Credentials) MarshalBinary ¶
func (m *Auth0Credentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*Auth0Credentials) UnmarshalBinary ¶
func (m *Auth0Credentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Auth0IDP ¶
type Auth0IDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // credentials Credentials *Auth0Credentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // settings Settings *Auth0Settings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
Auth0IDP auth0 ID p
swagger:model Auth0IDP
func (*Auth0IDP) ContextValidate ¶
ContextValidate validate this auth0 ID p based on the context it is used
func (*Auth0IDP) MarshalBinary ¶
MarshalBinary interface implementation
func (*Auth0IDP) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type Auth0Settings ¶
type Auth0Settings struct { // OAuth client application identifier // Example: client ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // String represented domain of the Auth0 for your organization // Example: dev-318ay013.us.auth0.com Domain string `json:"domain,omitempty" yaml:"domain,omitempty"` // If enabled, users' data is collected by calling the `userinfo` endpoint. GetUserInfo bool `json:"get_user_info,omitempty" yaml:"get_user_info,omitempty"` // An array of additional scopes your client requests // Example: ["email","profile","openid"] Scopes []string `json:"scopes" yaml:"scopes"` // Whether to send the identifier as a `login_hint` parameter to the IDP SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"` }
Auth0Settings Auth0 IDP specific settings
swagger:model Auth0Settings
func (*Auth0Settings) ContextValidate ¶
ContextValidate validates this auth0 settings based on context it is used
func (*Auth0Settings) MarshalBinary ¶
func (m *Auth0Settings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*Auth0Settings) UnmarshalBinary ¶
func (m *Auth0Settings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AuthenticationContext ¶
type AuthenticationContext map[string]interface{}
AuthenticationContext authentication context
swagger:model AuthenticationContext
func (AuthenticationContext) ContextValidate ¶
ContextValidate validates this authentication context based on context it is used
type AuthenticationContextAttribute ¶
type AuthenticationContextAttribute struct { // String represented display name of an attribute Description string `json:"description,omitempty" yaml:"description,omitempty"` // Array of Strings represents attribute labels Labels []string `json:"labels" yaml:"labels"` // String represented variable name of an attribute Name string `json:"name,omitempty" yaml:"name,omitempty"` // The data type of an attribute // // It stores information what kind of data is used as the value of the attribute. // // Available types: `number`, `string`, `bool`, `object`, `number_array`, `string_array`, `bool_array`, `object_array` or `any`. Type string `json:"type,omitempty" yaml:"type,omitempty"` }
AuthenticationContextAttribute Authentication context attribute
swagger:model AuthenticationContextAttribute
func (*AuthenticationContextAttribute) ContextValidate ¶
func (m *AuthenticationContextAttribute) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this authentication context attribute based on context it is used
func (*AuthenticationContextAttribute) MarshalBinary ¶
func (m *AuthenticationContextAttribute) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AuthenticationContextAttribute) UnmarshalBinary ¶
func (m *AuthenticationContextAttribute) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AuthenticationContextSettings ¶
type AuthenticationContextSettings struct { // attributes Attributes []*AuthenticationContextAttribute `json:"attributes" yaml:"attributes"` }
AuthenticationContextSettings authentication context settings
swagger:model AuthenticationContextSettings
func (*AuthenticationContextSettings) ContextValidate ¶
func (m *AuthenticationContextSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this authentication context settings based on the context it is used
func (*AuthenticationContextSettings) MarshalBinary ¶
func (m *AuthenticationContextSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AuthenticationContextSettings) UnmarshalBinary ¶
func (m *AuthenticationContextSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AuthenticationMechanisms ¶
type AuthenticationMechanisms []string
AuthenticationMechanisms AuthenticationMechanisms authentication mechanisms
swagger:model AuthenticationMechanisms
func (AuthenticationMechanisms) ContextValidate ¶
func (m AuthenticationMechanisms) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this authentication mechanisms based on context it is used
type AuthnAuthorityDescriptor ¶
type AuthnAuthorityDescriptor struct { // assertion ID request services AssertionIDRequestServices []*Endpoint `json:"AssertionIDRequestServices" yaml:"AssertionIDRequestServices"` // authn query services AuthnQueryServices []*Endpoint `json:"AuthnQueryServices" yaml:"AuthnQueryServices"` // cache duration CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"` // contact people ContactPeople []*ContactPerson `json:"ContactPeople" yaml:"ContactPeople"` // error URL ErrorURL string `json:"ErrorURL,omitempty" yaml:"ErrorURL,omitempty"` // ID ID string `json:"ID,omitempty" yaml:"ID,omitempty"` // key descriptors KeyDescriptors []*KeyDescriptor `json:"KeyDescriptors" yaml:"KeyDescriptors"` // name ID formats NameIDFormats []NameIDFormat `json:"NameIDFormats" yaml:"NameIDFormats"` // organization Organization *Organization `json:"Organization,omitempty" yaml:"Organization,omitempty"` // protocol support enumeration ProtocolSupportEnumeration string `json:"ProtocolSupportEnumeration,omitempty" yaml:"ProtocolSupportEnumeration,omitempty"` // signature Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"` // valid until // Format: date-time ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"` }
AuthnAuthorityDescriptor AuthnAuthorityDescriptor represents the SAML AuthnAuthorityDescriptor object.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.5
swagger:model AuthnAuthorityDescriptor
func (*AuthnAuthorityDescriptor) ContextValidate ¶
func (m *AuthnAuthorityDescriptor) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this authn authority descriptor based on the context it is used
func (*AuthnAuthorityDescriptor) MarshalBinary ¶
func (m *AuthnAuthorityDescriptor) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AuthnAuthorityDescriptor) UnmarshalBinary ¶
func (m *AuthnAuthorityDescriptor) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AuthorizationDetail ¶
type AuthorizationDetail struct { // An authorization server (workspace) identifier holding the client application. // Example: default // Required: true AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"` // Description // Example: Authorization detail for payment initiation Description string `json:"description,omitempty" yaml:"description,omitempty"` // Authorization detail unique identifier ID string `json:"id,omitempty" yaml:"id,omitempty"` // General purpose metadata Metadata map[string]interface{} `json:"metadata,omitempty" yaml:"metadata,omitempty"` // Display name // Example: Payment Initiation Name string `json:"name,omitempty" yaml:"name,omitempty"` // schema Schema *SupportedJSONSchema `json:"schema,omitempty" yaml:"schema,omitempty"` // ID of the tenant // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // type // Required: true Type *AuthorizationDetailType `json:"type" yaml:"type"` }
AuthorizationDetail Authorization detail
swagger:model AuthorizationDetail
func (*AuthorizationDetail) ContextValidate ¶
ContextValidate validate this authorization detail based on the context it is used
func (*AuthorizationDetail) MarshalBinary ¶
func (m *AuthorizationDetail) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AuthorizationDetail) UnmarshalBinary ¶
func (m *AuthorizationDetail) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AuthorizationDetailType ¶
type AuthorizationDetailType string
AuthorizationDetailType authorization detail type
swagger:model AuthorizationDetailType
func (AuthorizationDetailType) ContextValidate ¶
func (m AuthorizationDetailType) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this authorization detail type based on context it is used
type AuthorizationDetailWithService ¶
type AuthorizationDetailWithService struct { // An authorization server (workspace) identifier holding the client application. // Example: default // Required: true AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"` // Description // Example: Authorization detail for payment initiation Description string `json:"description,omitempty" yaml:"description,omitempty"` // Authorization detail unique identifier ID string `json:"id,omitempty" yaml:"id,omitempty"` // General purpose metadata Metadata map[string]interface{} `json:"metadata,omitempty" yaml:"metadata,omitempty"` // Display name // Example: Payment Initiation Name string `json:"name,omitempty" yaml:"name,omitempty"` // schema Schema *SupportedJSONSchema `json:"schema,omitempty" yaml:"schema,omitempty"` // service Service *Service `json:"service,omitempty" yaml:"service,omitempty"` // ID of the tenant // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // type // Required: true Type *AuthorizationDetailType `json:"type" yaml:"type"` }
AuthorizationDetailWithService authorization detail with service
swagger:model AuthorizationDetailWithService
func (*AuthorizationDetailWithService) ContextValidate ¶
func (m *AuthorizationDetailWithService) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this authorization detail with service based on the context it is used
func (*AuthorizationDetailWithService) MarshalBinary ¶
func (m *AuthorizationDetailWithService) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AuthorizationDetailWithService) UnmarshalBinary ¶
func (m *AuthorizationDetailWithService) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AuthorizationDetailWithServiceID ¶
type AuthorizationDetailWithServiceID struct { // An authorization server (workspace) identifier holding the client application. // Example: default // Required: true AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"` // Description // Example: Authorization detail for payment initiation Description string `json:"description,omitempty" yaml:"description,omitempty"` // Authorization detail unique identifier ID string `json:"id,omitempty" yaml:"id,omitempty"` // General purpose metadata Metadata map[string]interface{} `json:"metadata,omitempty" yaml:"metadata,omitempty"` // Display name // Example: Payment Initiation Name string `json:"name,omitempty" yaml:"name,omitempty"` // schema Schema *SupportedJSONSchema `json:"schema,omitempty" yaml:"schema,omitempty"` // Service id // Required: true ServiceID string `json:"service_id" yaml:"service_id"` // ID of the tenant // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // type // Required: true Type *AuthorizationDetailType `json:"type" yaml:"type"` }
AuthorizationDetailWithServiceID authorization detail with service ID
swagger:model AuthorizationDetailWithServiceID
func (*AuthorizationDetailWithServiceID) ContextValidate ¶
func (m *AuthorizationDetailWithServiceID) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this authorization detail with service ID based on the context it is used
func (*AuthorizationDetailWithServiceID) MarshalBinary ¶
func (m *AuthorizationDetailWithServiceID) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AuthorizationDetailWithServiceID) UnmarshalBinary ¶
func (m *AuthorizationDetailWithServiceID) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AuthorizationDetailsWithServices ¶
type AuthorizationDetailsWithServices struct { // list of authorization details AuthorizationDetails []*AuthorizationDetailWithService `json:"authorization_details" yaml:"authorization_details"` }
AuthorizationDetailsWithServices authorization details with services
swagger:model AuthorizationDetailsWithServices
func (*AuthorizationDetailsWithServices) ContextValidate ¶
func (m *AuthorizationDetailsWithServices) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this authorization details with services based on the context it is used
func (*AuthorizationDetailsWithServices) MarshalBinary ¶
func (m *AuthorizationDetailsWithServices) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AuthorizationDetailsWithServices) UnmarshalBinary ¶
func (m *AuthorizationDetailsWithServices) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AutomaticKeyRotation ¶
type AutomaticKeyRotation struct { // cron // Required: true Cron string `json:"cron" yaml:"cron"` // enabled // Required: true Enabled bool `json:"enabled" yaml:"enabled"` // scheduled at // Read Only: true // Format: date-time ScheduledAt strfmt.DateTime `json:"scheduled_at,omitempty" yaml:"scheduled_at,omitempty"` // starting from // Format: date-time StartingFrom strfmt.DateTime `json:"starting_from,omitempty" yaml:"starting_from,omitempty"` }
AutomaticKeyRotation automatic key rotation
swagger:model AutomaticKeyRotation
func (*AutomaticKeyRotation) ContextValidate ¶
ContextValidate validate this automatic key rotation based on the context it is used
func (*AutomaticKeyRotation) MarshalBinary ¶
func (m *AutomaticKeyRotation) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AutomaticKeyRotation) UnmarshalBinary ¶
func (m *AutomaticKeyRotation) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AvailableEvents ¶
type AvailableEvents struct { // The ETag HTTP header is an identifier for a specific version of a resource // // in:header Etag string `json:"etag,omitempty" yaml:"etag,omitempty"` // List of the events // in:body Subjects []*EventSubject `json:"subjects" yaml:"subjects"` }
AvailableEvents AvailableEvents
swagger:model AvailableEvents
func (*AvailableEvents) ContextValidate ¶
ContextValidate validate this available events based on the context it is used
func (*AvailableEvents) MarshalBinary ¶
func (m *AvailableEvents) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AvailableEvents) UnmarshalBinary ¶
func (m *AvailableEvents) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AzureB2CCredentials ¶
type AzureB2CCredentials struct { // Application secret from your Microsoft Azure application settings ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"` }
AzureB2CCredentials Azure IDP B2C specific credentials
swagger:model AzureB2CCredentials
func (*AzureB2CCredentials) ContextValidate ¶
ContextValidate validates this azure b2 c credentials based on context it is used
func (*AzureB2CCredentials) MarshalBinary ¶
func (m *AzureB2CCredentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AzureB2CCredentials) UnmarshalBinary ¶
func (m *AzureB2CCredentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AzureB2CIDP ¶
type AzureB2CIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // credentials Credentials *AzureB2CCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // settings Settings *AzureB2CSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
AzureB2CIDP azure b2 c ID p
swagger:model AzureB2CIDP
func (*AzureB2CIDP) ContextValidate ¶
ContextValidate validate this azure b2 c ID p based on the context it is used
func (*AzureB2CIDP) MarshalBinary ¶
func (m *AzureB2CIDP) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AzureB2CIDP) UnmarshalBinary ¶
func (m *AzureB2CIDP) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AzureB2CSettings ¶
type AzureB2CSettings struct { // Application ID from your Microsoft Azure B2C application settings // Example: client ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // Custom domain from your Microsoft Azure application settings when using a custom // domain such as with Azure Front Door. This is optional. // Example: my.customdomain.com CustomDomain string `json:"custom_domain,omitempty" yaml:"custom_domain,omitempty"` // If enabled, the groups a user belongs to are collected // // Groups are collections of users and other principals who share access to resources in // Microsoft services or in your app. Microsoft Graph provides APIs that you can use to create // and manage different types of groups and group functionality according to your scenario. // // You can only get groups data if you are entitled to call the Microsoft Graph API. // Example: true FetchGroups bool `json:"fetch_groups,omitempty" yaml:"fetch_groups,omitempty"` // If enabled, users' data is collected from the Microsoft Graph API // // You can only get user's data if you are entitled to call the Microsoft Graph API. GetUser bool `json:"get_user,omitempty" yaml:"get_user,omitempty"` // An array of user attributes fetched from the Microsoft Graph API GraphUserAttributes []string `json:"graph_user_attributes" yaml:"graph_user_attributes"` // String represented group name format used for fetching groups // // It's value can be either `id` or `name`. // Example: id GroupNameFormat string `json:"group_name_format,omitempty" yaml:"group_name_format,omitempty"` // If enabled, only security groups a user belongs to are collected. // Example: true OnlySecurityGroups bool `json:"only_security_groups,omitempty" yaml:"only_security_groups,omitempty"` // The user flow to be run. // Specify the name of a user flow you've created in your Azure AD B2C tenant. // Example: b2c_1_sign_in Policy string `json:"policy,omitempty" yaml:"policy,omitempty"` // An array of additional scopes your client is going to request // Example: ["email","profile","openid"] Scopes []string `json:"scopes" yaml:"scopes"` // Whether to send the identifier as a `login_hint` parameter to the IDP SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"` // Directory ID from your Microsoft Azure B2C application settings // Example: 123-312-123 Tenant string `json:"tenant,omitempty" yaml:"tenant,omitempty"` }
AzureB2CSettings Azure AD B2C authentication settings
swagger:model AzureB2CSettings
func (*AzureB2CSettings) ContextValidate ¶
ContextValidate validates this azure b2 c settings based on context it is used
func (*AzureB2CSettings) MarshalBinary ¶
func (m *AzureB2CSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AzureB2CSettings) UnmarshalBinary ¶
func (m *AzureB2CSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AzureCredentials ¶
type AzureCredentials struct { // Application secret from your Microsoft Azure application settings ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"` }
AzureCredentials Azure IDP specific credentials
swagger:model AzureCredentials
func (*AzureCredentials) ContextValidate ¶
ContextValidate validates this azure credentials based on context it is used
func (*AzureCredentials) MarshalBinary ¶
func (m *AzureCredentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AzureCredentials) UnmarshalBinary ¶
func (m *AzureCredentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AzureIDP ¶
type AzureIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // credentials Credentials *AzureCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // settings Settings *AzureSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
AzureIDP azure ID p
swagger:model AzureIDP
func (*AzureIDP) ContextValidate ¶
ContextValidate validate this azure ID p based on the context it is used
func (*AzureIDP) MarshalBinary ¶
MarshalBinary interface implementation
func (*AzureIDP) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type AzureMetadata ¶
type AzureMetadata struct { // apim id ApimID string `json:"apim_id,omitempty" yaml:"apim_id,omitempty"` // apim name ApimName string `json:"apim_name,omitempty" yaml:"apim_name,omitempty"` }
AzureMetadata azure metadata
swagger:model AzureMetadata
func (*AzureMetadata) ContextValidate ¶
ContextValidate validates this azure metadata based on context it is used
func (*AzureMetadata) MarshalBinary ¶
func (m *AzureMetadata) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AzureMetadata) UnmarshalBinary ¶
func (m *AzureMetadata) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type AzureSettings ¶
type AzureSettings struct { // Application ID from your Microsoft Azure application settings ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // If enabled, the groups a user belongs to are collected // // Groups are collections of users and other principals who share access to resources in // Microsoft services or in your app. Microsoft Graph provides APIs that you can use to create // and manage different types of groups and group functionality according to your scenario. // // You can only get groups data if you are entitled to call the Microsoft Graph API. FetchGroups bool `json:"fetch_groups,omitempty" yaml:"fetch_groups,omitempty"` // If enabled, users' data is collected from the Microsoft Graph API // // You can only get user's data if you are entitled to call the Microsoft Graph API. GetUser bool `json:"get_user,omitempty" yaml:"get_user,omitempty"` // An array of user attributes fetched from the Microsoft Graph API GraphUserAttributes []string `json:"graph_user_attributes" yaml:"graph_user_attributes"` // String represented group name format used for fetching groups // // It's value can be either `id` or `name`. GroupNameFormat string `json:"group_name_format,omitempty" yaml:"group_name_format,omitempty"` // If enabled, only security groups a user belongs to are collected. OnlySecurityGroups bool `json:"only_security_groups,omitempty" yaml:"only_security_groups,omitempty"` // An array of additional scopes your client requests Scopes []string `json:"scopes" yaml:"scopes"` // Whether to send the identifier as a `login_hint` parameter to the IDP SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"` // Directory ID from your Microsoft Azure application settings Tenant string `json:"tenant,omitempty" yaml:"tenant,omitempty"` }
AzureSettings Azure IDP specific settings
swagger:model AzureSettings
func (*AzureSettings) ContextValidate ¶
ContextValidate validates this azure settings based on context it is used
func (*AzureSettings) MarshalBinary ¶
func (m *AzureSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*AzureSettings) UnmarshalBinary ¶
func (m *AzureSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type BRConsentPayload ¶
type BRConsentPayload struct { // account ids AccountIds []string `json:"account_ids" yaml:"account_ids"` // Client application identifier. // Example: \"cauqo9c9vpbs0aj2b2v0\ ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // consent id ConsentID string `json:"consent_id,omitempty" yaml:"consent_id,omitempty"` // created at // Format: date-time CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"` // idempotency key IdempotencyKey string `json:"idempotency_key,omitempty" yaml:"idempotency_key,omitempty"` // request hash RequestHash string `json:"request_hash,omitempty" yaml:"request_hash,omitempty"` // Server / Workspace identifier. // Example: \"server\ ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // spec Spec string `json:"spec,omitempty" yaml:"spec,omitempty"` // spec version SpecVersion SpecVersion `json:"spec_version,omitempty" yaml:"spec_version,omitempty"` // status Status string `json:"status,omitempty" yaml:"status,omitempty"` // Tenant identifier. // Example: \"tenant\ TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type Type ConsentType `json:"type,omitempty" yaml:"type,omitempty"` }
BRConsentPayload b r consent payload
swagger:model BRConsentPayload
func (*BRConsentPayload) ContextValidate ¶
ContextValidate validate this b r consent payload based on the context it is used
func (*BRConsentPayload) MarshalBinary ¶
func (m *BRConsentPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*BRConsentPayload) UnmarshalBinary ¶
func (m *BRConsentPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type BindGroupToServiceRequest ¶
type BindGroupToServiceRequest struct { // service id ServiceID string `json:"service_id,omitempty" yaml:"service_id,omitempty"` }
BindGroupToServiceRequest bind group to service request
swagger:model BindGroupToServiceRequest
func (*BindGroupToServiceRequest) ContextValidate ¶
func (m *BindGroupToServiceRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this bind group to service request based on context it is used
func (*BindGroupToServiceRequest) MarshalBinary ¶
func (m *BindGroupToServiceRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*BindGroupToServiceRequest) UnmarshalBinary ¶
func (m *BindGroupToServiceRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type BindSystemAPIRequest ¶
type BindSystemAPIRequest struct { // api id APIID string `json:"api_id,omitempty" yaml:"api_id,omitempty"` // policy id PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"` // policy server id PolicyServerID string `json:"policy_server_id,omitempty" yaml:"policy_server_id,omitempty"` }
BindSystemAPIRequest bind system API request
swagger:model BindSystemAPIRequest
func (*BindSystemAPIRequest) ContextValidate ¶
ContextValidate validates this bind system API request based on context it is used
func (*BindSystemAPIRequest) MarshalBinary ¶
func (m *BindSystemAPIRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*BindSystemAPIRequest) UnmarshalBinary ¶
func (m *BindSystemAPIRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type BruteForceLimit ¶
type BruteForceLimit struct { // block duration // Example: 1m0s // Required: true // Format: duration BlockDuration strfmt.Duration `json:"block_duration" yaml:"block_duration"` // Max number of attempts // Example: 5 // Required: true MaxAttempts int64 `json:"max_attempts" yaml:"max_attempts"` // protected type // Required: true ProtectedType *ProtectedType `json:"protected_type" yaml:"protected_type"` // tenant id // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` }
BruteForceLimit brute force limit
swagger:model BruteForceLimit
func (*BruteForceLimit) ContextValidate ¶
ContextValidate validate this brute force limit based on the context it is used
func (*BruteForceLimit) MarshalBinary ¶
func (m *BruteForceLimit) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*BruteForceLimit) UnmarshalBinary ¶
func (m *BruteForceLimit) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type BruteForceLimits ¶
type BruteForceLimits struct { // brute force limits BruteForceLimits []*BruteForceLimit `json:"brute_force_limits" yaml:"brute_force_limits"` }
BruteForceLimits brute force limits
swagger:model BruteForceLimits
func (*BruteForceLimits) ContextValidate ¶
ContextValidate validate this brute force limits based on the context it is used
func (*BruteForceLimits) MarshalBinary ¶
func (m *BruteForceLimits) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*BruteForceLimits) UnmarshalBinary ¶
func (m *BruteForceLimits) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CDRArrangement ¶
type CDRArrangement struct { // List of accounts. // // It can refer to user's bank accounts that can be accessed by your client application in order to provide consumer // services. AccountIds []string `json:"account_ids" yaml:"account_ids"` // amending arrangement id AmendingArrangementID CDRArrangementID `json:"amending_arrangement_id,omitempty" yaml:"amending_arrangement_id,omitempty"` // Workspace identifier // Example: server AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // cdr arrangement id CdrArrangementID CDRArrangementID `json:"cdr_arrangement_id,omitempty" yaml:"cdr_arrangement_id,omitempty"` // cdr arrangement metadata CdrArrangementMetadata *CDRArrangementMetadata `json:"cdr_arrangement_metadata,omitempty" yaml:"cdr_arrangement_metadata,omitempty"` // Client application identifier // Example: bugkgm23g9kregtu051g ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // Arrangement creation date // Example: 2022-07-01T08:52:27.127932Z // Format: date-time CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"` // customer id CustomerID CDRCustomerID `json:"customer_id,omitempty" yaml:"customer_id,omitempty"` // Arrangement expiration date // Example: 2023-03-01T09:02:27.127932Z // Format: date-time Expiry strfmt.DateTime `json:"expiry,omitempty" yaml:"expiry,omitempty"` // The detailed list of scopes voluntarily granted by the user for the client application to access user data. ScopeGrants []*ScopeGrant `json:"scope_grants" yaml:"scope_grants"` // The rule on how a user shares their data: reuse with a token or without it, or the user allows one-time access. // Example: one_time // Enum: ["one_time","one_time_with_refresh_token","reusable"] SharingType string `json:"sharing_type,omitempty" yaml:"sharing_type,omitempty"` // Arrangement version. // Currently, the version parameter is not used. // Example: v1 // Enum: ["v1"] SpecVersion string `json:"spec_version,omitempty" yaml:"spec_version,omitempty"` // status Status ConsentStatus `json:"status,omitempty" yaml:"status,omitempty"` // Subject identifies an authenticated user. // Depending on the workspace configuration, the value can be hashed. // Example: 377eb000a87a471291b5a9869930a2422c670b7b6a06f74143eb74a01ed2fbe1 Subject string `json:"subject,omitempty" yaml:"subject,omitempty"` // Tenant identifier // Example: my-company TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // Arrangement last update date // Example: 2022-10-01T08:52:27.127932Z // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"` }
CDRArrangement c d r arrangement
swagger:model CDRArrangement
func (*CDRArrangement) ContextValidate ¶
ContextValidate validate this c d r arrangement based on the context it is used
func (*CDRArrangement) MarshalBinary ¶
func (m *CDRArrangement) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CDRArrangement) UnmarshalBinary ¶
func (m *CDRArrangement) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CDRArrangementID ¶
type CDRArrangementID string
CDRArrangementID c d r arrangement ID
swagger:model CDRArrangementID
func (CDRArrangementID) ContextValidate ¶
ContextValidate validates this c d r arrangement ID based on context it is used
type CDRArrangementMetadata ¶
type CDRArrangementMetadata struct { // personal details PersonalDetails *PersonalDetails `json:"personal_details,omitempty" yaml:"personal_details,omitempty"` // revocation channel RevocationChannel RevocationChannel `json:"revocation_channel,omitempty" yaml:"revocation_channel,omitempty"` // revocation reason RevocationReason RevocationReason `json:"revocation_reason,omitempty" yaml:"revocation_reason,omitempty"` }
CDRArrangementMetadata c d r arrangement metadata
swagger:model CDRArrangementMetadata
func (*CDRArrangementMetadata) ContextValidate ¶
func (m *CDRArrangementMetadata) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this c d r arrangement metadata based on the context it is used
func (*CDRArrangementMetadata) MarshalBinary ¶
func (m *CDRArrangementMetadata) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CDRArrangementMetadata) UnmarshalBinary ¶
func (m *CDRArrangementMetadata) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CDRArrangementsAutoRemoval ¶
type CDRArrangementsAutoRemoval struct { // enable auto removal Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"` // Period in days after which arrangements in Expired status will be removed RemoveAfterDays int64 `json:"remove_after_days,omitempty" yaml:"remove_after_days,omitempty"` }
CDRArrangementsAutoRemoval c d r arrangements auto removal
swagger:model CDRArrangementsAutoRemoval
func (*CDRArrangementsAutoRemoval) ContextValidate ¶
func (m *CDRArrangementsAutoRemoval) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this c d r arrangements auto removal based on context it is used
func (*CDRArrangementsAutoRemoval) MarshalBinary ¶
func (m *CDRArrangementsAutoRemoval) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CDRArrangementsAutoRemoval) UnmarshalBinary ¶
func (m *CDRArrangementsAutoRemoval) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CDRConfiguration ¶
type CDRConfiguration struct { // Flag to enable / disable ADR validation // If enabled, register URL must be provided and point to a existing registry AdrValidationEnabled bool `json:"adr_validation_enabled,omitempty" yaml:"adr_validation_enabled,omitempty"` // arrangements auto removal ArrangementsAutoRemoval *CDRArrangementsAutoRemoval `json:"arrangements_auto_removal,omitempty" yaml:"arrangements_auto_removal,omitempty"` // brand id BrandID string `json:"brand_id,omitempty" yaml:"brand_id,omitempty"` // Do not cache trust anchor data, fetch it from registry every time // This is useful for testing purposes when the registry might not be fully up when the test is run DontCacheTrustAnchorData bool `json:"dont_cache_trust_anchor_data,omitempty" yaml:"dont_cache_trust_anchor_data,omitempty"` // industry Industry CDRIndustry `json:"industry,omitempty" yaml:"industry,omitempty"` // register api version RegisterAPIVersion CDRRegisterAPIVersion `json:"register_api_version,omitempty" yaml:"register_api_version,omitempty"` // register url RegisterURL CDRRegisterURL `json:"register_url,omitempty" yaml:"register_url,omitempty"` // Flag to disable register URL validation // If enabled, there will be no error message // if data from provided register URL can not be fetched // It is highly not recommended to use this flag if it is not required SkipRegisterURLValidation bool `json:"skip_register_url_validation,omitempty" yaml:"skip_register_url_validation,omitempty"` }
CDRConfiguration c d r configuration
swagger:model CDRConfiguration
func (*CDRConfiguration) ContextValidate ¶
ContextValidate validate this c d r configuration based on the context it is used
func (*CDRConfiguration) MarshalBinary ¶
func (m *CDRConfiguration) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CDRConfiguration) UnmarshalBinary ¶
func (m *CDRConfiguration) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CDRCustomerID ¶
type CDRCustomerID string
CDRCustomerID c d r customer ID
swagger:model CDRCustomerID
func (CDRCustomerID) ContextValidate ¶
ContextValidate validates this c d r customer ID based on context it is used
type CDRIndustry ¶
type CDRIndustry string
CDRIndustry c d r industry
swagger:model CDRIndustry
func (CDRIndustry) ContextValidate ¶
ContextValidate validates this c d r industry based on context it is used
type CDRRegisterAPIVersion ¶
type CDRRegisterAPIVersion string
CDRRegisterAPIVersion c d r register API version
swagger:model CDRRegisterAPIVersion
func (CDRRegisterAPIVersion) ContextValidate ¶
ContextValidate validates this c d r register API version based on context it is used
type CDRRegisterURL ¶
type CDRRegisterURL string
CDRRegisterURL c d r register URL
swagger:model CDRRegisterURL
func (CDRRegisterURL) ContextValidate ¶
ContextValidate validates this c d r register URL based on context it is used
type CIBAAuthenticationService ¶
type CIBAAuthenticationService struct { // client id ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // external External *ExternalCIBAAuthenticationService `json:"external,omitempty" yaml:"external,omitempty"` // server id ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type Type string `json:"type,omitempty" yaml:"type,omitempty"` }
CIBAAuthenticationService c i b a authentication service
swagger:model CIBAAuthenticationService
func (*CIBAAuthenticationService) ContextValidate ¶
func (m *CIBAAuthenticationService) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this c i b a authentication service based on the context it is used
func (*CIBAAuthenticationService) MarshalBinary ¶
func (m *CIBAAuthenticationService) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CIBAAuthenticationService) UnmarshalBinary ¶
func (m *CIBAAuthenticationService) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CertificateInfo ¶
type CertificateInfo struct { // jwks Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"` // SAN DNS entries from the certificate. SanDNS []string `json:"san_dns" yaml:"san_dns"` // SAN emails entries from the certificate. SanEmails []string `json:"san_emails" yaml:"san_emails"` // SAN IP addresses entry from the certificate. SanIps []string `json:"san_ips" yaml:"san_ips"` // SAN uniformResourceIdentifier entries from the certificate. SanUris []string `json:"san_uris" yaml:"san_uris"` // Certificate subject DN SubjectDn string `json:"subject_dn,omitempty" yaml:"subject_dn,omitempty"` }
CertificateInfo certificate info
swagger:model CertificateInfo
func (*CertificateInfo) ContextValidate ¶
ContextValidate validate this certificate info based on the context it is used
func (*CertificateInfo) MarshalBinary ¶
func (m *CertificateInfo) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CertificateInfo) UnmarshalBinary ¶
func (m *CertificateInfo) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Claim ¶
type Claim struct { // authorization server id // Example: default AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // description Description string `json:"description,omitempty" yaml:"description,omitempty"` // unique claim id // Example: 1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // DeprecatedMapping use SourceType and SourcePath instead // claim mapping - path to attribute in authentication context from where claim value should be picked // Example: email Mapping string `json:"mapping,omitempty" yaml:"mapping,omitempty"` // claim name in outgoing id / access token // Example: email Name string `json:"name,omitempty" yaml:"name,omitempty"` // included in userinfo/introspect endpoints only Opaque bool `json:"opaque,omitempty" yaml:"opaque,omitempty"` // saml name // Example: email SamlName string `json:"saml_name,omitempty" yaml:"saml_name,omitempty"` // saml name format // Example: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress SamlNameFormat string `json:"saml_name_format,omitempty" yaml:"saml_name_format,omitempty"` // list of scopes - when at least one of listed scopes has been granted to a client, then claim will be added to id / access token. // In case of empty array claim is always added. // Example: ["email","email_verified"] Scopes []string `json:"scopes" yaml:"scopes"` // path to the attribute in source type context where claim value should be picked from SourcePath string `json:"source_path,omitempty" yaml:"source_path,omitempty"` // source type SourceType ClaimSourceType `json:"source_type,omitempty" yaml:"source_type,omitempty"` // tenant id // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type Type ClaimType `json:"type,omitempty" yaml:"type,omitempty"` // mark claim as verified (required by identity assurance spec) Verified bool `json:"verified,omitempty" yaml:"verified,omitempty"` }
Claim claim
swagger:model Claim
func (*Claim) ContextValidate ¶
ContextValidate validate this claim based on the context it is used
func (*Claim) MarshalBinary ¶
MarshalBinary interface implementation
func (*Claim) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type ClaimGrant ¶
type ClaimGrant struct { // The claim name as it's set initially. // Example: email ClaimName string `json:"claim_name,omitempty" yaml:"claim_name,omitempty"` // claim type ClaimType ClaimType `json:"claim_type,omitempty" yaml:"claim_type,omitempty"` // Identifier of a client application that is granted with the claim. // Example: bugkgm23g9kregtu051g ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // Time when the claim was granted // Format: date-time GivenAt strfmt.DateTime `json:"given_at,omitempty" yaml:"given_at,omitempty"` // Language Language string `json:"language,omitempty" yaml:"language,omitempty"` // Identifier of a server where the client app is hosted. // Example: my-server ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // Identifier of a user who granted the claim. Subject string `json:"subject,omitempty" yaml:"subject,omitempty"` // Identifier of the tenant where the client app is hosted. // Example: my-company TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // mark claim as verified (required by identity assurance spec) Verified bool `json:"verified,omitempty" yaml:"verified,omitempty"` }
ClaimGrant claim grant
swagger:model ClaimGrant
func (*ClaimGrant) ContextValidate ¶
ContextValidate validate this claim grant based on the context it is used
func (*ClaimGrant) MarshalBinary ¶
func (m *ClaimGrant) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ClaimGrant) UnmarshalBinary ¶
func (m *ClaimGrant) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ClaimSourceType ¶
type ClaimSourceType string
ClaimSourceType claim source type
swagger:model ClaimSourceType
func (ClaimSourceType) ContextValidate ¶
ContextValidate validates this claim source type based on context it is used
type ClaimType ¶
type ClaimType string
ClaimType claim type, one of: id_token, access_token, saml_assertion example: id_token
swagger:model ClaimType
func (ClaimType) ContextValidate ¶
ContextValidate validates this claim type based on context it is used
type Claims ¶
type Claims struct { // list of claims Claims []*Claim `json:"claims" yaml:"claims"` }
Claims claims
swagger:model Claims
func (*Claims) ContextValidate ¶
ContextValidate validate this claims based on the context it is used
func (*Claims) MarshalBinary ¶
MarshalBinary interface implementation
func (*Claims) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type ClaimsGrantedPayload ¶
type ClaimsGrantedPayload struct { // List of claims to grant. NewClaimGrants []*ClaimGrant `json:"new_claim_grants" yaml:"new_claim_grants"` }
ClaimsGrantedPayload claims granted payload
swagger:model ClaimsGrantedPayload
func (*ClaimsGrantedPayload) ContextValidate ¶
ContextValidate validate this claims granted payload based on the context it is used
func (*ClaimsGrantedPayload) MarshalBinary ¶
func (m *ClaimsGrantedPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ClaimsGrantedPayload) UnmarshalBinary ¶
func (m *ClaimsGrantedPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Client ¶
type Client struct { // Application URL AppURL string `json:"app_url,omitempty" yaml:"app_url,omitempty"` // The client application type. // // Client applications can be either of a `web` or `native` types. // // Web applications include clients like server web applications or service apps. // // Native applications include single-page applications (SPAs) and mobile or desktop // applications. // // Apply security measures according to the type of your application. // Example: web ApplicationType string `json:"application_type,omitempty" yaml:"application_type,omitempty"` // An array of dynamically calculated application types that can be used for filtering // Example: ["single_page","server_web","mobile_desktop","service","legacy","dcr"] // Read Only: true ApplicationTypes []string `json:"application_types" yaml:"application_types"` // Identity of the intended recipients (the audience). // // Typically, the audience is a single resource server or a list of resource servers. // // It is considered a good practice to limit the audience of the token for security purposes. Audience []string `json:"audience" yaml:"audience"` // Authorization details types // // Indicates what authorization details types the client can use. AuthorizationDetailsTypes []AuthorizationDetailType `json:"authorization_details_types" yaml:"authorization_details_types"` // Algorithm used for encrypting authorization responses. // // If both signing and encryption are requested, the response is first signed, and then encrypted. // As a result, a Nested JWT is obtained, as defined in JWT [RFC7519]. // // If omitted, no encryption is applied by default. // Example: RSA-OAEP-256 // Enum: ["RSA-OAEP","RSA-OAEP-256"] AuthorizationEncryptedResponseAlg string `json:"authorization_encrypted_response_alg,omitempty" yaml:"authorization_encrypted_response_alg,omitempty"` // Algorithm used for encrypting authorization responses. // // With `authorization_encrypted_response_alg` specified, the default value is `A128CBC-HS256`. // When `authorization_encrypted_response_enc` is included, `authorization_encrypted_response_alg` // MUST also be provided in a request. // Example: A128CBC-HS256 // Enum: ["A256GCM","A128CBC-HS256"] AuthorizationEncryptedResponseEnc string `json:"authorization_encrypted_response_enc,omitempty" yaml:"authorization_encrypted_response_enc,omitempty"` // An authorization server (workspace) identifier holding the client application. // Example: default // Required: true AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"` // Algorithm used for signing authorization responses. // // With this parameter specified, the response is signed using JWS and according to the configured algorithm. // // `none` isn't allowed. // Example: RS256 AuthorizationSignedResponseAlg string `json:"authorization_signed_response_alg,omitempty" yaml:"authorization_signed_response_alg,omitempty"` // OPTIONAL. The JWS alg algorithm value used by the client application to sign authentication requests. // // When omitted, the client application doesn't send signed authentication requests. BackchannelAuthenticationRequestSigningAlg string `` /* 127-byte string literal not displayed */ // REQUIRED for requests when the client application uses CIBA as an authorization grant type, and the token // delivery mode is set to `ping` or `push`. // // This parameter is the endpoint where an OP (OpenID Provider) posts a notification after end-user authentication. // // Input: an HTTPS URL. BackchannelClientNotificationEndpoint string `json:"backchannel_client_notification_endpoint,omitempty" yaml:"backchannel_client_notification_endpoint,omitempty"` // Boolean value specifying whether the RP requires that a sid (session ID) claim be included in the Logout Token to identify the RP session with the OP when the backchannel_logout_uri is used. BackchannelLogoutSessionRequired bool `json:"backchannel_logout_session_required,omitempty" yaml:"backchannel_logout_session_required,omitempty"` // RP URL that will cause the RP to log itself out when sent a Logout Token by the OP. BackchannelLogoutURI string `json:"backchannel_logout_uri,omitempty" yaml:"backchannel_logout_uri,omitempty"` // REQUIRED for requests when the client application uses CIBA as an authorization grant type. // // Input: `poll`, `ping`, or `push`. BackchannelTokenDeliveryMode string `json:"backchannel_token_delivery_mode,omitempty" yaml:"backchannel_token_delivery_mode,omitempty"` // OPTIONAL. A boolean value indicating the `user_code` parameter support by the client application. // // If omitted, the default value is `false`. // // This applies only when the `backchannel_user_code_parameter_supported` OP parameter is `true`. BackchannelUserCodeParameter bool `json:"backchannel_user_code_parameter,omitempty" yaml:"backchannel_user_code_parameter,omitempty"` // OAuth client application identifier // // If not provided, a random client ID is generated. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // The client identifier time of issue. // // The value is the number of seconds between 1970-01-01T00:00:00Z (UTC) and the date/time of issue. ClientIDIssuedAt int64 `json:"client_id_issued_at,omitempty" yaml:"client_id_issued_at,omitempty"` // Human-readable name of a client application. // Example: My app ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"` // OAuth client secret // // If not provided, a random client secret is generated. // Min Length: 32 ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"` // The client secret expiration time. // // If the client secret does not expire, `client_secret_expires_at` = `0`. ClientSecretExpiresAt int64 `json:"client_secret_expires_at,omitempty" yaml:"client_secret_expires_at,omitempty"` // Defines whether the client application is active or not. // // Only clients with the `Active` status can preform authorization, authentication, and PAR requests. // Enum: ["active","inactive"] ClientStatus string `json:"client_status,omitempty" yaml:"client_status,omitempty"` // client type // Enum: ["oauth2","saml"] ClientType string `json:"client_type,omitempty" yaml:"client_type,omitempty"` // URI of a client application. ClientURI string `json:"client_uri,omitempty" yaml:"client_uri,omitempty"` // confirmation Confirmation *Confirmation `json:"confirmation,omitempty" yaml:"confirmation,omitempty"` // Date when the client application was created. // Example: 2022-04-07T19:17:31.323187Z // Format: date-time CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"` // default ACR values // list of ACR values that will be implicitly requested for the client if not explicitly specified DefaultAcrValues []string `json:"default_acr_values" yaml:"default_acr_values"` // Description of the client application. Description string `json:"description,omitempty" yaml:"description,omitempty"` // Optional developer owner of the client application. DeveloperID string `json:"developer_id,omitempty" yaml:"developer_id,omitempty"` // developer metadata DeveloperMetadata Metadata `json:"developer_metadata,omitempty" yaml:"developer_metadata,omitempty"` // Boolean value specifying whether the client always uses DPoP for token requests // If true, the authorization server will reject token requests from this client that do not contain the DPoP header. DpopBoundAccessTokens bool `json:"dpop_bound_access_tokens,omitempty" yaml:"dpop_bound_access_tokens,omitempty"` // dynamically registered DynamicallyRegistered bool `json:"dynamically_registered,omitempty" yaml:"dynamically_registered,omitempty"` // fdx Fdx *FDXMetadata `json:"fdx,omitempty" yaml:"fdx,omitempty"` // An array of allowed OAuth client grant types. // // The `grantTypes` array stores OAuth flows that are allowed for a given client application. // // [Read more](https://cloudentity.com/developers/basics/oauth-grant-types/grant-types-overview/) about grant types. // Example: ["password","refresh_token","client_credentials","implicit","authorization_code"] GrantTypes []string `json:"grant_types" yaml:"grant_types"` // An array of hashed rotated client secrets HashedRotatedSecrets []string `json:"hashed_rotated_secrets" yaml:"hashed_rotated_secrets"` // Hashed client secret // // Hashing client secrets provides additional security for your secrets storage as it hides // plaintext secrets from being viewed both in the UI and the database. HashedSecret string `json:"hashed_secret,omitempty" yaml:"hashed_secret,omitempty"` // JWE alg algorithm for encrypting the ID token issued to this client application. // Enum: ["RSA-OAEP","RSA-OAEP-256"] IDTokenEncryptedResponseAlg string `json:"id_token_encrypted_response_alg,omitempty" yaml:"id_token_encrypted_response_alg,omitempty"` // JWE enc algorithm for encrypting the ID token issued to this client application. // Enum: ["A256GCM","A128CBC-HS256"] IDTokenEncryptedResponseEnc string `json:"id_token_encrypted_response_enc,omitempty" yaml:"id_token_encrypted_response_enc,omitempty"` // Algorithm for signing ID tokens issued for a client application. // // The default value depends on authorization server configuration. // Example: ES256 // Enum: ["RS256","ES256","PS256"] IDTokenSignedResponseAlg string `json:"id_token_signed_response_alg,omitempty" yaml:"id_token_signed_response_alg,omitempty"` // An introspection endpoint authentication method configured for the client application (read-only). // // If empty, the `token_endpoint_auth_method` is used. // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none"] IntrospectionEndpointAuthMethod string `json:"introspection_endpoint_auth_method,omitempty" yaml:"introspection_endpoint_auth_method,omitempty"` // jwks Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"` // A URL of JSON Web Key Set with the public keys used by a client application to authenticate to Cloudentity. JwksURI string `json:"jwks_uri,omitempty" yaml:"jwks_uri,omitempty"` // Logo URI. LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // metadata Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // obbr Obbr *OBBRMetadata `json:"obbr,omitempty" yaml:"obbr,omitempty"` // External organization identifier. It is a unique string assigned by the CDR Register to identify an Accredited // Data Recipient Brand. // // The value obtained is used as the `aud` claim for message signing, for example, when a JSON Web Token (JWT) is // required for authorization, and represents the audience(s) the JWT is intended for. // Example: 5647fe90-f6bc-11eb-9a03-0242ac130003 OrganisationID string `json:"organisation_id,omitempty" yaml:"organisation_id,omitempty"` // Policy URL to read about how the profile data is used. PolicyURI string `json:"policy_uri,omitempty" yaml:"policy_uri,omitempty"` // Array of URLs to which a relying party may request that the user be redirected after a logout has been performed. PostLogoutRedirectUris []string `json:"post_logout_redirect_uris" yaml:"post_logout_redirect_uris"` // privacy Privacy *ClientPrivacy `json:"privacy,omitempty" yaml:"privacy,omitempty"` // redirect uris RedirectUris RedirectURIs `json:"redirect_uris,omitempty" yaml:"redirect_uris,omitempty"` // registration token RegistrationToken *RegistrationToken `json:"registration_token,omitempty" yaml:"registration_token,omitempty"` // Optional JWE alg algorithm the client is declaring that it may use for encrypting Request Objects // Example: RSA-OAEP // Enum: ["RSA-OAEP","RSA-OAEP-256"] RequestObjectEncryptionAlg string `json:"request_object_encryption_alg,omitempty" yaml:"request_object_encryption_alg,omitempty"` // Optional JWE enc algorithm the client is declaring that it may use for encrypting Request Objects // When `request_object_encryption_enc` is included, `request_object_encryption_alg` MUST also be provided. // Example: A256GCM // Enum: ["A256GCM","A128CBC-HS256"] RequestObjectEncryptionEnc string `json:"request_object_encryption_enc,omitempty" yaml:"request_object_encryption_enc,omitempty"` // Request object signing algorithm for the token endpoint // // Cloudentity supports signing tokens with the RS256, ES256, and PS256 algorithms. If you do not want // to use a signing algorithm, set the value of this parameter to `none`. // Example: none // Enum: ["any","none","RS256","ES256","PS256"] RequestObjectSigningAlg string `json:"request_object_signing_alg,omitempty" yaml:"request_object_signing_alg,omitempty"` // Array of absolute URIs that points to the Request Object that holds authorization request parameters. RequestUris []string `json:"request_uris" yaml:"request_uris"` // Boolean parameter indicating whether the only means of initiating an authorization request the client is allowed to use is PAR. RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"` // response types ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"` // A revocation endpoint authentication method configured for the client application (read-only). // If empty, the `token_endpoint_auth_method` is used. // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none"] RevocationEndpointAuthMethod string `json:"revocation_endpoint_auth_method,omitempty" yaml:"revocation_endpoint_auth_method,omitempty"` // An array of rotated OAuth client secrets RotatedSecrets []string `json:"rotated_secrets" yaml:"rotated_secrets"` // saml metadata SamlMetadata *EntityDescriptor `json:"saml_metadata,omitempty" yaml:"saml_metadata,omitempty"` // saml service provider id SamlServiceProviderID string `json:"saml_service_provider_id,omitempty" yaml:"saml_service_provider_id,omitempty"` // Space-separated list of scopes for compatibility with the OAuth specification. // Example: email offline_access openid Scope string `json:"scope,omitempty" yaml:"scope,omitempty"` // An array of string represented scopes assigned to a client application // Example: ["email","offline_access","openid"] Scopes []string `json:"scopes" yaml:"scopes"` // OPTIONAL. [A URL using the HTTPS scheme](https://openid.net/specs/openid-connect-registration-1_0.html#SectorIdentifierValidation). // It must reference a JSON file with the array of `redirect_uri` values. // // Pass this parameter when you use multiple domains in your `redirect_uris` or need a mechanism to allow changes in // domain without affecting consumer consent. // // [Read more](https://openid.net/specs/openid-connect-core-1_0.html) SectorIdentifierURI string `json:"sector_identifier_uri,omitempty" yaml:"sector_identifier_uri,omitempty"` // A unique identifier string (e.g., a Universally Unique Identifier // (UUID)) assigned by the client developer or software publisher. // // The `software_id` MUST remain the same across // multiple updates or versions of the same software package. The // value of this field is not intended to be human-readable and is // usually opaque to the client and authorization server. SoftwareID string `json:"software_id,omitempty" yaml:"software_id,omitempty"` // A digitally signed or MACed JSON Web Token (JWT) [RFC7519] that // asserts metadata values about the client software. In some cases, // a software statement is issued directly by the client // developer. In other cases, a software statement is issued by // a third-party organization for use by the client developer. // // In both cases, the trust relationship the authorization server has // with the issuer of the software statement is intended to be used // as an input to the evaluation of whether the registration request // is accepted. // // A software statement can be presented to an // authorization server as part of the client registration request. SoftwareStatement string `json:"software_statement,omitempty" yaml:"software_statement,omitempty"` // software statement payload SoftwareStatementPayload Metadata `json:"software_statement_payload,omitempty" yaml:"software_statement_payload,omitempty"` // A version identifier string for the client software identified by // `software_id`. The value of the `software_version` MUST be changed // with any update of the client software identified by the same // `software_id`. SoftwareVersion string `json:"software_version,omitempty" yaml:"software_version,omitempty"` // Subject identifier type // // Stores information if the subject identifier is of the `public` or the `pairwise` type. // // Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer, // and are intended to be consumed by client applications. There are two types // of subject identifiers: `public` and `pairwise`. // // For the `public` type, the value of the `sub` (subject) token claim is the same for all clients. // // For the `pairwise` type, a different `sub` (subject) token claim is provided for each client. // Using the `pairwise` subject identifier makes it impossible for client applications to correlate the end-user's // activity without their permission. // Example: public // Enum: ["public","pairwise"] SubjectType string `json:"subject_type,omitempty" yaml:"subject_type,omitempty"` // Defines whether the client application is a system tenant's application or not. System bool `json:"system,omitempty" yaml:"system,omitempty"` // ID of a tenant where the client application is added // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // A string containing the value of an expected dNSName SAN entry in the certificate. TLSClientAuthSanDNS string `json:"tls_client_auth_san_dns,omitempty" yaml:"tls_client_auth_san_dns,omitempty"` // A string containing the value of an expected rfc822Name SAN entry in the certificate. TLSClientAuthSanEmail string `json:"tls_client_auth_san_email,omitempty" yaml:"tls_client_auth_san_email,omitempty"` // A string representation of an IP address in either dotted decimal notation (for IPv4) or colon-delimited hexadecimal (for IPv6, as defined in [RFC5952]) that is expected to be present as an iPAddress SAN entry in the certificate. TLSClientAuthSanIP string `json:"tls_client_auth_san_ip,omitempty" yaml:"tls_client_auth_san_ip,omitempty"` // A string containing the value of an expected uniformResourceIdentifier SAN entry in the certificate. TLSClientAuthSanURI string `json:"tls_client_auth_san_uri,omitempty" yaml:"tls_client_auth_san_uri,omitempty"` // An [RFC4514] string representation of the expected subject distinguished name of the certificate. TLSClientAuthSubjectDn string `json:"tls_client_auth_subject_dn,omitempty" yaml:"tls_client_auth_subject_dn,omitempty"` // Boolean value indicating server support for mutual TLS client certificate-bound access tokens. If omitted, the default value is "false". TLSClientCertificateBoundAccessTokens bool `json:"tls_client_certificate_bound_access_tokens,omitempty" yaml:"tls_client_certificate_bound_access_tokens,omitempty"` // Token endpoint authentication method configured for a client application // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // To learn more, go to the Authorization Basics > Client Authentication section of this guide. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none","unspecified"] TokenEndpointAuthMethod string `json:"token_endpoint_auth_method,omitempty" yaml:"token_endpoint_auth_method,omitempty"` // Signing algorithm for the token endpoint // // This field is optional. If empty, a client can use any algorithm supported by the server (see `token_endpoint_auth_signing_alg_values_supported` in the well-known endpoing). // // If provided, depending on the server configuration, client can use of one: HS256, RS256, ES256, PS256 algorithms. // // If your token endpoint authentication is set to the `private_key_jwt` method, the // `token_endpoint_auth_signing_alg` parameter must be either RS256, ES256, or PS256. // // If your token endpoint authentication is set to the `client_secret_jwt` method, // the `token_endpoint_auth_signing_alg` parameter must be HS256. // Example: ES256 // Enum: ["RS256","ES256","PS256","HS256",""] TokenEndpointAuthSigningAlg string `json:"token_endpoint_auth_signing_alg,omitempty" yaml:"token_endpoint_auth_signing_alg,omitempty"` // token exchange TokenExchange *ClientTokenExchangeConfiguration `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"` // token ttls TokenTtls *TokenTTLs `json:"token_ttls,omitempty" yaml:"token_ttls,omitempty"` // Terms of Service URL. TosURI string `json:"tos_uri,omitempty" yaml:"tos_uri,omitempty"` // Defines whether the client application is trusted or not. // // For trusted clients, consent pages are skipped during the authorization process. Trusted bool `json:"trusted,omitempty" yaml:"trusted,omitempty"` // Date when the client application was updated. // Example: 2022-05-08T01:11:51.1262916Z // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"` // If enabled the client application will be able to set its own token TTLs. UseCustomTokenTtls bool `json:"use_custom_token_ttls,omitempty" yaml:"use_custom_token_ttls,omitempty"` // JWS alg algorithm REQUIRED for signing UserInfo Responses. // // If specified, the response is a JWT serialized and signed with JWS. // // If omitted, then by default, UserInfo Response returns the Claims // as an UTF-8 encoded JSON object using the application/json content-type. // Example: none // Enum: ["none","RS256","ES256"] UserinfoSignedResponseAlg string `json:"userinfo_signed_response_alg,omitempty" yaml:"userinfo_signed_response_alg,omitempty"` }
Client Defines a client application and its properties.
swagger:model Client
func (*Client) ContextValidate ¶
ContextValidate validate this client based on the context it is used
func (*Client) MarshalBinary ¶
MarshalBinary interface implementation
func (*Client) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type ClientAdminResponse ¶
type ClientAdminResponse struct { // Application URL AppURL string `json:"app_url,omitempty" yaml:"app_url,omitempty"` // The client application type. // // Client applications can be either of a `web` or `native` types. // // Web applications include clients like server web applications or service apps. // // Native applications include single-page applications (SPAs) and mobile or desktop // applications. // // Apply security measures according to the type of your application. // Example: web ApplicationType string `json:"application_type,omitempty" yaml:"application_type,omitempty"` // An array of dynamically calculated application types that can be used for filtering // Example: ["single_page","server_web","mobile_desktop","service","legacy","dcr"] // Read Only: true ApplicationTypes []string `json:"application_types" yaml:"application_types"` // Identity of the intended recipients (the audience). // // Typically, the audience is a single resource server or a list of resource servers. // // It is considered a good practice to limit the audience of the token for security purposes. Audience []string `json:"audience" yaml:"audience"` // Authorization details types // // Indicates what authorization details types the client can use. AuthorizationDetailsTypes []AuthorizationDetailType `json:"authorization_details_types" yaml:"authorization_details_types"` // Algorithm used for encrypting authorization responses. // // If both signing and encryption are requested, the response is first signed, and then encrypted. // As a result, a Nested JWT is obtained, as defined in JWT [RFC7519]. // // If omitted, no encryption is applied by default. // Example: RSA-OAEP-256 // Enum: ["RSA-OAEP","RSA-OAEP-256"] AuthorizationEncryptedResponseAlg string `json:"authorization_encrypted_response_alg,omitempty" yaml:"authorization_encrypted_response_alg,omitempty"` // Algorithm used for encrypting authorization responses. // // With `authorization_encrypted_response_alg` specified, the default value is `A128CBC-HS256`. // When `authorization_encrypted_response_enc` is included, `authorization_encrypted_response_alg` // MUST also be provided in a request. // Example: A128CBC-HS256 // Enum: ["A256GCM","A128CBC-HS256"] AuthorizationEncryptedResponseEnc string `json:"authorization_encrypted_response_enc,omitempty" yaml:"authorization_encrypted_response_enc,omitempty"` // An authorization server (workspace) identifier holding the client application. // Example: default // Required: true AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"` // Algorithm used for signing authorization responses. // // With this parameter specified, the response is signed using JWS and according to the configured algorithm. // // `none` isn't allowed. // Example: RS256 AuthorizationSignedResponseAlg string `json:"authorization_signed_response_alg,omitempty" yaml:"authorization_signed_response_alg,omitempty"` // OPTIONAL. The JWS alg algorithm value used by the client application to sign authentication requests. // // When omitted, the client application doesn't send signed authentication requests. BackchannelAuthenticationRequestSigningAlg string `` /* 127-byte string literal not displayed */ // REQUIRED for requests when the client application uses CIBA as an authorization grant type, and the token // delivery mode is set to `ping` or `push`. // // This parameter is the endpoint where an OP (OpenID Provider) posts a notification after end-user authentication. // // Input: an HTTPS URL. BackchannelClientNotificationEndpoint string `json:"backchannel_client_notification_endpoint,omitempty" yaml:"backchannel_client_notification_endpoint,omitempty"` // Boolean value specifying whether the RP requires that a sid (session ID) claim be included in the Logout Token to identify the RP session with the OP when the backchannel_logout_uri is used. BackchannelLogoutSessionRequired bool `json:"backchannel_logout_session_required,omitempty" yaml:"backchannel_logout_session_required,omitempty"` // RP URL that will cause the RP to log itself out when sent a Logout Token by the OP. BackchannelLogoutURI string `json:"backchannel_logout_uri,omitempty" yaml:"backchannel_logout_uri,omitempty"` // REQUIRED for requests when the client application uses CIBA as an authorization grant type. // // Input: `poll`, `ping`, or `push`. BackchannelTokenDeliveryMode string `json:"backchannel_token_delivery_mode,omitempty" yaml:"backchannel_token_delivery_mode,omitempty"` // OPTIONAL. A boolean value indicating the `user_code` parameter support by the client application. // // If omitted, the default value is `false`. // // This applies only when the `backchannel_user_code_parameter_supported` OP parameter is `true`. BackchannelUserCodeParameter bool `json:"backchannel_user_code_parameter,omitempty" yaml:"backchannel_user_code_parameter,omitempty"` // OAuth client application identifier // // If not provided, a random client ID is generated. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // The client identifier time of issue. // // The value is the number of seconds between 1970-01-01T00:00:00Z (UTC) and the date/time of issue. ClientIDIssuedAt int64 `json:"client_id_issued_at,omitempty" yaml:"client_id_issued_at,omitempty"` // Human-readable name of a client application. // Example: My app ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"` // OAuth client secret // // If not provided, a random client secret is generated. // Min Length: 32 ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"` // The client secret expiration time. // // If the client secret does not expire, `client_secret_expires_at` = `0`. ClientSecretExpiresAt int64 `json:"client_secret_expires_at,omitempty" yaml:"client_secret_expires_at,omitempty"` // Defines whether the client application is active or not. // // Only clients with the `Active` status can preform authorization, authentication, and PAR requests. // Enum: ["active","inactive"] ClientStatus string `json:"client_status,omitempty" yaml:"client_status,omitempty"` // client type // Enum: ["oauth2","saml"] ClientType string `json:"client_type,omitempty" yaml:"client_type,omitempty"` // URI of a client application. ClientURI string `json:"client_uri,omitempty" yaml:"client_uri,omitempty"` // Date when the client application was created. // Example: 2022-04-07T19:17:31.323187Z // Format: date-time CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"` // default ACR values // list of ACR values that will be implicitly requested for the client if not explicitly specified DefaultAcrValues []string `json:"default_acr_values" yaml:"default_acr_values"` // Description of the client application. Description string `json:"description,omitempty" yaml:"description,omitempty"` // Optional developer owner of the client application. DeveloperID string `json:"developer_id,omitempty" yaml:"developer_id,omitempty"` // developer metadata DeveloperMetadata Metadata `json:"developer_metadata,omitempty" yaml:"developer_metadata,omitempty"` // Boolean value specifying whether the client always uses DPoP for token requests // If true, the authorization server will reject token requests from this client that do not contain the DPoP header. DpopBoundAccessTokens bool `json:"dpop_bound_access_tokens,omitempty" yaml:"dpop_bound_access_tokens,omitempty"` // dynamically registered DynamicallyRegistered bool `json:"dynamically_registered,omitempty" yaml:"dynamically_registered,omitempty"` // fdx Fdx *FDXMetadata `json:"fdx,omitempty" yaml:"fdx,omitempty"` // An array of allowed OAuth client grant types. // // The `grantTypes` array stores OAuth flows that are allowed for a given client application. // // [Read more](https://cloudentity.com/developers/basics/oauth-grant-types/grant-types-overview/) about grant types. // Example: ["password","refresh_token","client_credentials","implicit","authorization_code"] GrantTypes []string `json:"grant_types" yaml:"grant_types"` // An array of hashed rotated client secrets HashedRotatedSecrets []string `json:"hashed_rotated_secrets" yaml:"hashed_rotated_secrets"` // Hashed client secret // // Hashing client secrets provides additional security for your secrets storage as it hides // plaintext secrets from being viewed both in the UI and the database. HashedSecret string `json:"hashed_secret,omitempty" yaml:"hashed_secret,omitempty"` // JWE alg algorithm for encrypting the ID token issued to this client application. // Enum: ["RSA-OAEP","RSA-OAEP-256"] IDTokenEncryptedResponseAlg string `json:"id_token_encrypted_response_alg,omitempty" yaml:"id_token_encrypted_response_alg,omitempty"` // JWE enc algorithm for encrypting the ID token issued to this client application. // Enum: ["A256GCM","A128CBC-HS256"] IDTokenEncryptedResponseEnc string `json:"id_token_encrypted_response_enc,omitempty" yaml:"id_token_encrypted_response_enc,omitempty"` // Algorithm for signing ID tokens issued for a client application. // // The default value depends on authorization server configuration. // Example: ES256 // Enum: ["RS256","ES256","PS256"] IDTokenSignedResponseAlg string `json:"id_token_signed_response_alg,omitempty" yaml:"id_token_signed_response_alg,omitempty"` // An introspection endpoint authentication method configured for the client application (read-only). // // If empty, the `token_endpoint_auth_method` is used. // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none"] IntrospectionEndpointAuthMethod string `json:"introspection_endpoint_auth_method,omitempty" yaml:"introspection_endpoint_auth_method,omitempty"` // jwks Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"` // A URL of JSON Web Key Set with the public keys used by a client application to authenticate to Cloudentity. JwksURI string `json:"jwks_uri,omitempty" yaml:"jwks_uri,omitempty"` // Logo URI. LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // metadata Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // obbr Obbr *OBBRMetadata `json:"obbr,omitempty" yaml:"obbr,omitempty"` // External organization identifier. It is a unique string assigned by the CDR Register to identify an Accredited // Data Recipient Brand. // // The value obtained is used as the `aud` claim for message signing, for example, when a JSON Web Token (JWT) is // required for authorization, and represents the audience(s) the JWT is intended for. // Example: 5647fe90-f6bc-11eb-9a03-0242ac130003 OrganisationID string `json:"organisation_id,omitempty" yaml:"organisation_id,omitempty"` // Policy URL to read about how the profile data is used. PolicyURI string `json:"policy_uri,omitempty" yaml:"policy_uri,omitempty"` // Array of URLs to which a relying party may request that the user be redirected after a logout has been performed. PostLogoutRedirectUris []string `json:"post_logout_redirect_uris" yaml:"post_logout_redirect_uris"` // privacy Privacy *ClientPrivacy `json:"privacy,omitempty" yaml:"privacy,omitempty"` // redirect uris RedirectUris RedirectURIs `json:"redirect_uris,omitempty" yaml:"redirect_uris,omitempty"` // Optional JWE alg algorithm the client is declaring that it may use for encrypting Request Objects // Example: RSA-OAEP // Enum: ["RSA-OAEP","RSA-OAEP-256"] RequestObjectEncryptionAlg string `json:"request_object_encryption_alg,omitempty" yaml:"request_object_encryption_alg,omitempty"` // Optional JWE enc algorithm the client is declaring that it may use for encrypting Request Objects // When `request_object_encryption_enc` is included, `request_object_encryption_alg` MUST also be provided. // Example: A256GCM // Enum: ["A256GCM","A128CBC-HS256"] RequestObjectEncryptionEnc string `json:"request_object_encryption_enc,omitempty" yaml:"request_object_encryption_enc,omitempty"` // Request object signing algorithm for the token endpoint // // Cloudentity supports signing tokens with the RS256, ES256, and PS256 algorithms. If you do not want // to use a signing algorithm, set the value of this parameter to `none`. // Example: none // Enum: ["any","none","RS256","ES256","PS256"] RequestObjectSigningAlg string `json:"request_object_signing_alg,omitempty" yaml:"request_object_signing_alg,omitempty"` // Array of absolute URIs that points to the Request Object that holds authorization request parameters. RequestUris []string `json:"request_uris" yaml:"request_uris"` // Boolean parameter indicating whether the only means of initiating an authorization request the client is allowed to use is PAR. RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"` // response types ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"` // A revocation endpoint authentication method configured for the client application (read-only). // If empty, the `token_endpoint_auth_method` is used. // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none"] RevocationEndpointAuthMethod string `json:"revocation_endpoint_auth_method,omitempty" yaml:"revocation_endpoint_auth_method,omitempty"` // An array of rotated OAuth client secrets RotatedSecrets []string `json:"rotated_secrets" yaml:"rotated_secrets"` // saml metadata SamlMetadata *EntityDescriptor `json:"saml_metadata,omitempty" yaml:"saml_metadata,omitempty"` // saml service provider id SamlServiceProviderID string `json:"saml_service_provider_id,omitempty" yaml:"saml_service_provider_id,omitempty"` // Space-separated list of scopes for compatibility with the OAuth specification. // Example: email offline_access openid Scope string `json:"scope,omitempty" yaml:"scope,omitempty"` // An array of string represented scopes assigned to a client application // Example: ["email","offline_access","openid"] Scopes []string `json:"scopes" yaml:"scopes"` // OPTIONAL. [A URL using the HTTPS scheme](https://openid.net/specs/openid-connect-registration-1_0.html#SectorIdentifierValidation). // It must reference a JSON file with the array of `redirect_uri` values. // // Pass this parameter when you use multiple domains in your `redirect_uris` or need a mechanism to allow changes in // domain without affecting consumer consent. // // [Read more](https://openid.net/specs/openid-connect-core-1_0.html) SectorIdentifierURI string `json:"sector_identifier_uri,omitempty" yaml:"sector_identifier_uri,omitempty"` // server issuer url ServerIssuerURL string `json:"server_issuer_url,omitempty" yaml:"server_issuer_url,omitempty"` // server mtls issuer url ServerMtlsIssuerURL string `json:"server_mtls_issuer_url,omitempty" yaml:"server_mtls_issuer_url,omitempty"` // A unique identifier string (e.g., a Universally Unique Identifier // (UUID)) assigned by the client developer or software publisher. // // The `software_id` MUST remain the same across // multiple updates or versions of the same software package. The // value of this field is not intended to be human-readable and is // usually opaque to the client and authorization server. SoftwareID string `json:"software_id,omitempty" yaml:"software_id,omitempty"` // A digitally signed or MACed JSON Web Token (JWT) [RFC7519] that // asserts metadata values about the client software. In some cases, // a software statement is issued directly by the client // developer. In other cases, a software statement is issued by // a third-party organization for use by the client developer. // // In both cases, the trust relationship the authorization server has // with the issuer of the software statement is intended to be used // as an input to the evaluation of whether the registration request // is accepted. // // A software statement can be presented to an // authorization server as part of the client registration request. SoftwareStatement string `json:"software_statement,omitempty" yaml:"software_statement,omitempty"` // software statement payload SoftwareStatementPayload Metadata `json:"software_statement_payload,omitempty" yaml:"software_statement_payload,omitempty"` // A version identifier string for the client software identified by // `software_id`. The value of the `software_version` MUST be changed // with any update of the client software identified by the same // `software_id`. SoftwareVersion string `json:"software_version,omitempty" yaml:"software_version,omitempty"` // Subject identifier type // // Stores information if the subject identifier is of the `public` or the `pairwise` type. // // Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer, // and are intended to be consumed by client applications. There are two types // of subject identifiers: `public` and `pairwise`. // // For the `public` type, the value of the `sub` (subject) token claim is the same for all clients. // // For the `pairwise` type, a different `sub` (subject) token claim is provided for each client. // Using the `pairwise` subject identifier makes it impossible for client applications to correlate the end-user's // activity without their permission. // Example: public // Enum: ["public","pairwise"] SubjectType string `json:"subject_type,omitempty" yaml:"subject_type,omitempty"` // Defines whether the client application is a system tenant's application or not. System bool `json:"system,omitempty" yaml:"system,omitempty"` // ID of a tenant where the client application is added // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // A string containing the value of an expected dNSName SAN entry in the certificate. TLSClientAuthSanDNS string `json:"tls_client_auth_san_dns,omitempty" yaml:"tls_client_auth_san_dns,omitempty"` // A string containing the value of an expected rfc822Name SAN entry in the certificate. TLSClientAuthSanEmail string `json:"tls_client_auth_san_email,omitempty" yaml:"tls_client_auth_san_email,omitempty"` // A string representation of an IP address in either dotted decimal notation (for IPv4) or colon-delimited hexadecimal (for IPv6, as defined in [RFC5952]) that is expected to be present as an iPAddress SAN entry in the certificate. TLSClientAuthSanIP string `json:"tls_client_auth_san_ip,omitempty" yaml:"tls_client_auth_san_ip,omitempty"` // A string containing the value of an expected uniformResourceIdentifier SAN entry in the certificate. TLSClientAuthSanURI string `json:"tls_client_auth_san_uri,omitempty" yaml:"tls_client_auth_san_uri,omitempty"` // An [RFC4514] string representation of the expected subject distinguished name of the certificate. TLSClientAuthSubjectDn string `json:"tls_client_auth_subject_dn,omitempty" yaml:"tls_client_auth_subject_dn,omitempty"` // Boolean value indicating server support for mutual TLS client certificate-bound access tokens. If omitted, the default value is "false". TLSClientCertificateBoundAccessTokens bool `json:"tls_client_certificate_bound_access_tokens,omitempty" yaml:"tls_client_certificate_bound_access_tokens,omitempty"` // Token endpoint authentication method configured for a client application // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // To learn more, go to the Authorization Basics > Client Authentication section of this guide. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none","unspecified"] TokenEndpointAuthMethod string `json:"token_endpoint_auth_method,omitempty" yaml:"token_endpoint_auth_method,omitempty"` // Signing algorithm for the token endpoint // // This field is optional. If empty, a client can use any algorithm supported by the server (see `token_endpoint_auth_signing_alg_values_supported` in the well-known endpoing). // // If provided, depending on the server configuration, client can use of one: HS256, RS256, ES256, PS256 algorithms. // // If your token endpoint authentication is set to the `private_key_jwt` method, the // `token_endpoint_auth_signing_alg` parameter must be either RS256, ES256, or PS256. // // If your token endpoint authentication is set to the `client_secret_jwt` method, // the `token_endpoint_auth_signing_alg` parameter must be HS256. // Example: ES256 // Enum: ["RS256","ES256","PS256","HS256",""] TokenEndpointAuthSigningAlg string `json:"token_endpoint_auth_signing_alg,omitempty" yaml:"token_endpoint_auth_signing_alg,omitempty"` // token exchange TokenExchange *ClientTokenExchangeConfiguration `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"` // token ttls TokenTtls *TokenTTLs `json:"token_ttls,omitempty" yaml:"token_ttls,omitempty"` // Terms of Service URL. TosURI string `json:"tos_uri,omitempty" yaml:"tos_uri,omitempty"` // Defines whether the client application is trusted or not. // // For trusted clients, consent pages are skipped during the authorization process. Trusted bool `json:"trusted,omitempty" yaml:"trusted,omitempty"` // Date when the client application was updated. // Example: 2022-05-08T01:11:51.1262916Z // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"` // If enabled the client application will be able to set its own token TTLs. UseCustomTokenTtls bool `json:"use_custom_token_ttls,omitempty" yaml:"use_custom_token_ttls,omitempty"` // JWS alg algorithm REQUIRED for signing UserInfo Responses. // // If specified, the response is a JWT serialized and signed with JWS. // // If omitted, then by default, UserInfo Response returns the Claims // as an UTF-8 encoded JSON object using the application/json content-type. // Example: none // Enum: ["none","RS256","ES256"] UserinfoSignedResponseAlg string `json:"userinfo_signed_response_alg,omitempty" yaml:"userinfo_signed_response_alg,omitempty"` }
ClientAdminResponse client admin response
swagger:model ClientAdminResponse
func (*ClientAdminResponse) ContextValidate ¶
ContextValidate validate this client admin response based on the context it is used
func (*ClientAdminResponse) MarshalBinary ¶
func (m *ClientAdminResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ClientAdminResponse) UnmarshalBinary ¶
func (m *ClientAdminResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ClientAuditPayload ¶
type ClientAuditPayload struct { // Application URL AppURL string `json:"app_url,omitempty" yaml:"app_url,omitempty"` // The client application type. // // Client applications can be either of a `web` or `native` types. // // Web applications include clients like server web applications or service apps. // // Native applications include single-page applications (SPAs) and mobile or desktop // applications. // // Apply security measures according to the type of your application. // Example: web ApplicationType string `json:"application_type,omitempty" yaml:"application_type,omitempty"` // An array of dynamically calculated application types that can be used for filtering // Example: ["single_page","server_web","mobile_desktop","service","legacy","dcr"] // Read Only: true ApplicationTypes []string `json:"application_types" yaml:"application_types"` // Identity of the intended recipients (the audience). // // Typically, the audience is a single resource server or a list of resource servers. // // It is considered a good practice to limit the audience of the token for security purposes. Audience []string `json:"audience" yaml:"audience"` // Authorization details types // // Indicates what authorization details types the client can use. AuthorizationDetailsTypes []AuthorizationDetailType `json:"authorization_details_types" yaml:"authorization_details_types"` // Algorithm used for encrypting authorization responses. // // If both signing and encryption are requested, the response is first signed, and then encrypted. // As a result, a Nested JWT is obtained, as defined in JWT [RFC7519]. // // If omitted, no encryption is applied by default. // Example: RSA-OAEP-256 // Enum: ["RSA-OAEP","RSA-OAEP-256"] AuthorizationEncryptedResponseAlg string `json:"authorization_encrypted_response_alg,omitempty" yaml:"authorization_encrypted_response_alg,omitempty"` // Algorithm used for encrypting authorization responses. // // With `authorization_encrypted_response_alg` specified, the default value is `A128CBC-HS256`. // When `authorization_encrypted_response_enc` is included, `authorization_encrypted_response_alg` // MUST also be provided in a request. // Example: A128CBC-HS256 // Enum: ["A256GCM","A128CBC-HS256"] AuthorizationEncryptedResponseEnc string `json:"authorization_encrypted_response_enc,omitempty" yaml:"authorization_encrypted_response_enc,omitempty"` // An authorization server (workspace) identifier holding the client application. // Example: default // Required: true AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"` // Algorithm used for signing authorization responses. // // With this parameter specified, the response is signed using JWS and according to the configured algorithm. // // `none` isn't allowed. // Example: RS256 AuthorizationSignedResponseAlg string `json:"authorization_signed_response_alg,omitempty" yaml:"authorization_signed_response_alg,omitempty"` // OPTIONAL. The JWS alg algorithm value used by the client application to sign authentication requests. // // When omitted, the client application doesn't send signed authentication requests. BackchannelAuthenticationRequestSigningAlg string `` /* 127-byte string literal not displayed */ // REQUIRED for requests when the client application uses CIBA as an authorization grant type, and the token // delivery mode is set to `ping` or `push`. // // This parameter is the endpoint where an OP (OpenID Provider) posts a notification after end-user authentication. // // Input: an HTTPS URL. BackchannelClientNotificationEndpoint string `json:"backchannel_client_notification_endpoint,omitempty" yaml:"backchannel_client_notification_endpoint,omitempty"` // Boolean value specifying whether the RP requires that a sid (session ID) claim be included in the Logout Token to identify the RP session with the OP when the backchannel_logout_uri is used. BackchannelLogoutSessionRequired bool `json:"backchannel_logout_session_required,omitempty" yaml:"backchannel_logout_session_required,omitempty"` // RP URL that will cause the RP to log itself out when sent a Logout Token by the OP. BackchannelLogoutURI string `json:"backchannel_logout_uri,omitempty" yaml:"backchannel_logout_uri,omitempty"` // REQUIRED for requests when the client application uses CIBA as an authorization grant type. // // Input: `poll`, `ping`, or `push`. BackchannelTokenDeliveryMode string `json:"backchannel_token_delivery_mode,omitempty" yaml:"backchannel_token_delivery_mode,omitempty"` // OPTIONAL. A boolean value indicating the `user_code` parameter support by the client application. // // If omitted, the default value is `false`. // // This applies only when the `backchannel_user_code_parameter_supported` OP parameter is `true`. BackchannelUserCodeParameter bool `json:"backchannel_user_code_parameter,omitempty" yaml:"backchannel_user_code_parameter,omitempty"` // OAuth client application identifier // // If not provided, a random client ID is generated. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // The client identifier time of issue. // // The value is the number of seconds between 1970-01-01T00:00:00Z (UTC) and the date/time of issue. ClientIDIssuedAt int64 `json:"client_id_issued_at,omitempty" yaml:"client_id_issued_at,omitempty"` // Human-readable name of a client application. // Example: My app ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"` // The client secret expiration time. // // If the client secret does not expire, `client_secret_expires_at` = `0`. ClientSecretExpiresAt int64 `json:"client_secret_expires_at,omitempty" yaml:"client_secret_expires_at,omitempty"` // Defines whether the client application is active or not. // // Only clients with the `Active` status can preform authorization, authentication, and PAR requests. // Enum: ["active","inactive"] ClientStatus string `json:"client_status,omitempty" yaml:"client_status,omitempty"` // URI of a client application. ClientURI string `json:"client_uri,omitempty" yaml:"client_uri,omitempty"` // Date when the client application was created. // Example: 2022-04-07T19:17:31.323187Z // Format: date-time CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"` // default ACR values // list of ACR values that will be implicitly requested for the client if not explicitly specified DefaultAcrValues []string `json:"default_acr_values" yaml:"default_acr_values"` // Description of the client application. Description string `json:"description,omitempty" yaml:"description,omitempty"` // Optional developer owner of the client application. DeveloperID string `json:"developer_id,omitempty" yaml:"developer_id,omitempty"` // developer metadata DeveloperMetadata Metadata `json:"developer_metadata,omitempty" yaml:"developer_metadata,omitempty"` // Boolean value specifying whether the client always uses DPoP for token requests // If true, the authorization server will reject token requests from this client that do not contain the DPoP header. DpopBoundAccessTokens bool `json:"dpop_bound_access_tokens,omitempty" yaml:"dpop_bound_access_tokens,omitempty"` // dynamically registered DynamicallyRegistered bool `json:"dynamically_registered,omitempty" yaml:"dynamically_registered,omitempty"` // An array of allowed OAuth client grant types. // // The `grantTypes` array stores OAuth flows that are allowed for a given client application. // // [Read more](https://cloudentity.com/developers/basics/oauth-grant-types/grant-types-overview/) about grant types. // Example: ["password","refresh_token","client_credentials","implicit","authorization_code"] GrantTypes []string `json:"grant_types" yaml:"grant_types"` // JWE alg algorithm for encrypting the ID token issued to this client application. // Enum: ["RSA-OAEP","RSA-OAEP-256"] IDTokenEncryptedResponseAlg string `json:"id_token_encrypted_response_alg,omitempty" yaml:"id_token_encrypted_response_alg,omitempty"` // JWE enc algorithm for encrypting the ID token issued to this client application. // Enum: ["A256GCM","A128CBC-HS256"] IDTokenEncryptedResponseEnc string `json:"id_token_encrypted_response_enc,omitempty" yaml:"id_token_encrypted_response_enc,omitempty"` // Algorithm for signing ID tokens issued for a client application. // // The default value depends on authorization server configuration. // Example: ES256 // Enum: ["RS256","ES256","PS256"] IDTokenSignedResponseAlg string `json:"id_token_signed_response_alg,omitempty" yaml:"id_token_signed_response_alg,omitempty"` // An introspection endpoint authentication method configured for the client application (read-only). // // If empty, the `token_endpoint_auth_method` is used. // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none"] IntrospectionEndpointAuthMethod string `json:"introspection_endpoint_auth_method,omitempty" yaml:"introspection_endpoint_auth_method,omitempty"` // jwks Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"` // A URL of JSON Web Key Set with the public keys used by a client application to authenticate to Cloudentity. JwksURI string `json:"jwks_uri,omitempty" yaml:"jwks_uri,omitempty"` // Logo URI. LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // metadata Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // External organization identifier. It is a unique string assigned by the CDR Register to identify an Accredited // Data Recipient Brand. // // The value obtained is used as the `aud` claim for message signing, for example, when a JSON Web Token (JWT) is // required for authorization, and represents the audience(s) the JWT is intended for. // Example: 5647fe90-f6bc-11eb-9a03-0242ac130003 OrganisationID string `json:"organisation_id,omitempty" yaml:"organisation_id,omitempty"` // Policy URL to read about how the profile data is used. PolicyURI string `json:"policy_uri,omitempty" yaml:"policy_uri,omitempty"` // Array of URLs to which a relying party may request that the user be redirected after a logout has been performed. PostLogoutRedirectUris []string `json:"post_logout_redirect_uris" yaml:"post_logout_redirect_uris"` // privacy Privacy *ClientPrivacy `json:"privacy,omitempty" yaml:"privacy,omitempty"` // redirect uris RedirectUris RedirectURIs `json:"redirect_uris,omitempty" yaml:"redirect_uris,omitempty"` // Optional JWE alg algorithm the client is declaring that it may use for encrypting Request Objects // Example: RSA-OAEP // Enum: ["RSA-OAEP","RSA-OAEP-256"] RequestObjectEncryptionAlg string `json:"request_object_encryption_alg,omitempty" yaml:"request_object_encryption_alg,omitempty"` // Optional JWE enc algorithm the client is declaring that it may use for encrypting Request Objects // When `request_object_encryption_enc` is included, `request_object_encryption_alg` MUST also be provided. // Example: A256GCM // Enum: ["A256GCM","A128CBC-HS256"] RequestObjectEncryptionEnc string `json:"request_object_encryption_enc,omitempty" yaml:"request_object_encryption_enc,omitempty"` // Request object signing algorithm for the token endpoint // // Cloudentity supports signing tokens with the RS256, ES256, and PS256 algorithms. If you do not want // to use a signing algorithm, set the value of this parameter to `none`. // Example: none // Enum: ["any","none","RS256","ES256","PS256"] RequestObjectSigningAlg string `json:"request_object_signing_alg,omitempty" yaml:"request_object_signing_alg,omitempty"` // Array of absolute URIs that points to the Request Object that holds authorization request parameters. RequestUris []string `json:"request_uris" yaml:"request_uris"` // Boolean parameter indicating whether the only means of initiating an authorization request the client is allowed to use is PAR. RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"` // response types ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"` // A revocation endpoint authentication method configured for the client application (read-only). // If empty, the `token_endpoint_auth_method` is used. // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none"] RevocationEndpointAuthMethod string `json:"revocation_endpoint_auth_method,omitempty" yaml:"revocation_endpoint_auth_method,omitempty"` // Space-separated list of scopes for compatibility with the OAuth specification. // Example: email offline_access openid Scope string `json:"scope,omitempty" yaml:"scope,omitempty"` // An array of string represented scopes assigned to a client application // Example: ["email","offline_access","openid"] Scopes []string `json:"scopes" yaml:"scopes"` // OPTIONAL. [A URL using the HTTPS scheme](https://openid.net/specs/openid-connect-registration-1_0.html#SectorIdentifierValidation). // It must reference a JSON file with the array of `redirect_uri` values. // // Pass this parameter when you use multiple domains in your `redirect_uris` or need a mechanism to allow changes in // domain without affecting consumer consent. // // [Read more](https://openid.net/specs/openid-connect-core-1_0.html) SectorIdentifierURI string `json:"sector_identifier_uri,omitempty" yaml:"sector_identifier_uri,omitempty"` // A digitally signed or MACed JSON Web Token (JWT) [RFC7519] that // asserts metadata values about the client software. In some cases, // a software statement is issued directly by the client // developer. In other cases, a software statement is issued by // a third-party organization for use by the client developer. // // In both cases, the trust relationship the authorization server has // with the issuer of the software statement is intended to be used // as an input to the evaluation of whether the registration request // is accepted. // // A software statement can be presented to an // authorization server as part of the client registration request. SoftwareStatement string `json:"software_statement,omitempty" yaml:"software_statement,omitempty"` // software statement payload SoftwareStatementPayload Metadata `json:"software_statement_payload,omitempty" yaml:"software_statement_payload,omitempty"` // Subject identifier type // // Stores information if the subject identifier is of the `public` or the `pairwise` type. // // Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer, // and are intended to be consumed by client applications. There are two types // of subject identifiers: `public` and `pairwise`. // // For the `public` type, the value of the `sub` (subject) token claim is the same for all clients. // // For the `pairwise` type, a different `sub` (subject) token claim is provided for each client. // Using the `pairwise` subject identifier makes it impossible for client applications to correlate the end-user's // activity without their permission. // Example: public // Enum: ["public","pairwise"] SubjectType string `json:"subject_type,omitempty" yaml:"subject_type,omitempty"` // Defines whether the client application is a system tenant's application or not. System bool `json:"system,omitempty" yaml:"system,omitempty"` // ID of a tenant where the client application is added // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // A string containing the value of an expected dNSName SAN entry in the certificate. TLSClientAuthSanDNS string `json:"tls_client_auth_san_dns,omitempty" yaml:"tls_client_auth_san_dns,omitempty"` // A string containing the value of an expected rfc822Name SAN entry in the certificate. TLSClientAuthSanEmail string `json:"tls_client_auth_san_email,omitempty" yaml:"tls_client_auth_san_email,omitempty"` // A string representation of an IP address in either dotted decimal notation (for IPv4) or colon-delimited hexadecimal (for IPv6, as defined in [RFC5952]) that is expected to be present as an iPAddress SAN entry in the certificate. TLSClientAuthSanIP string `json:"tls_client_auth_san_ip,omitempty" yaml:"tls_client_auth_san_ip,omitempty"` // A string containing the value of an expected uniformResourceIdentifier SAN entry in the certificate. TLSClientAuthSanURI string `json:"tls_client_auth_san_uri,omitempty" yaml:"tls_client_auth_san_uri,omitempty"` // An [RFC4514] string representation of the expected subject distinguished name of the certificate. TLSClientAuthSubjectDn string `json:"tls_client_auth_subject_dn,omitempty" yaml:"tls_client_auth_subject_dn,omitempty"` // Boolean value indicating server support for mutual TLS client certificate-bound access tokens. If omitted, the default value is "false". TLSClientCertificateBoundAccessTokens bool `json:"tls_client_certificate_bound_access_tokens,omitempty" yaml:"tls_client_certificate_bound_access_tokens,omitempty"` // Token endpoint authentication method configured for a client application // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // To learn more, go to the Authorization Basics > Client Authentication section of this guide. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none","unspecified"] TokenEndpointAuthMethod string `json:"token_endpoint_auth_method,omitempty" yaml:"token_endpoint_auth_method,omitempty"` // Signing algorithm for the token endpoint // // This field is optional. If empty, a client can use any algorithm supported by the server (see `token_endpoint_auth_signing_alg_values_supported` in the well-known endpoing). // // If provided, depending on the server configuration, client can use of one: HS256, RS256, ES256, PS256 algorithms. // // If your token endpoint authentication is set to the `private_key_jwt` method, the // `token_endpoint_auth_signing_alg` parameter must be either RS256, ES256, or PS256. // // If your token endpoint authentication is set to the `client_secret_jwt` method, // the `token_endpoint_auth_signing_alg` parameter must be HS256. // Example: ES256 // Enum: ["RS256","ES256","PS256","HS256",""] TokenEndpointAuthSigningAlg string `json:"token_endpoint_auth_signing_alg,omitempty" yaml:"token_endpoint_auth_signing_alg,omitempty"` // token exchange TokenExchange *ClientTokenExchangeConfiguration `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"` // token ttls TokenTtls *TokenTTLs `json:"token_ttls,omitempty" yaml:"token_ttls,omitempty"` // Terms of Service URL. TosURI string `json:"tos_uri,omitempty" yaml:"tos_uri,omitempty"` // Defines whether the client application is trusted or not. // // For trusted clients, consent pages are skipped during the authorization process. Trusted bool `json:"trusted,omitempty" yaml:"trusted,omitempty"` // Date when the client application was updated. // Example: 2022-05-08T01:11:51.1262916Z // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"` // If enabled the client application will be able to set its own token TTLs. UseCustomTokenTtls bool `json:"use_custom_token_ttls,omitempty" yaml:"use_custom_token_ttls,omitempty"` // JWS alg algorithm REQUIRED for signing UserInfo Responses. // // If specified, the response is a JWT serialized and signed with JWS. // // If omitted, then by default, UserInfo Response returns the Claims // as an UTF-8 encoded JSON object using the application/json content-type. // Example: none // Enum: ["none","RS256","ES256"] UserinfoSignedResponseAlg string `json:"userinfo_signed_response_alg,omitempty" yaml:"userinfo_signed_response_alg,omitempty"` }
ClientAuditPayload client audit payload
swagger:model ClientAuditPayload
func (*ClientAuditPayload) ContextValidate ¶
ContextValidate validate this client audit payload based on the context it is used
func (*ClientAuditPayload) MarshalBinary ¶
func (m *ClientAuditPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ClientAuditPayload) UnmarshalBinary ¶
func (m *ClientAuditPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ClientConsentsAuditEventPayload ¶
type ClientConsentsAuditEventPayload struct { // client id ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // number of consents revoked NumberRevoked int64 `json:"number_revoked,omitempty" yaml:"number_revoked,omitempty"` }
ClientConsentsAuditEventPayload client consents audit event payload
swagger:model ClientConsentsAuditEventPayload
func (*ClientConsentsAuditEventPayload) ContextValidate ¶
func (m *ClientConsentsAuditEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this client consents audit event payload based on context it is used
func (*ClientConsentsAuditEventPayload) MarshalBinary ¶
func (m *ClientConsentsAuditEventPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ClientConsentsAuditEventPayload) UnmarshalBinary ¶
func (m *ClientConsentsAuditEventPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ClientJWK ¶
type ClientJWK struct { // The "alg" (algorithm) parameter identifies the algorithm intended for // use with the key. The values used should either be registered in the // IANA "JSON Web Signature and Encryption Algorithms" registry // established by [JWA] or be a value that contains a Collision- // Resistant Name. // Example: RS256 Alg string `json:"alg,omitempty" yaml:"alg,omitempty"` // crv // Example: P-256 Crv string `json:"crv,omitempty" yaml:"crv,omitempty"` // d // Example: T_N8I-6He3M8a7X1vWt6TGIx4xB_GP3Mb4SsZSA4v-orvJzzRiQhLlRR81naWYxfQAYt5isDI6_C2L9bdWo4FFPjGQFvNoRX-_sBJyBI_rl-TBgsZYoUlAj3J92WmY2inbA-PwyJfsaIIDceYBC-eX-xiCu6qMqkZi3MwQAFL6bMdPEM0z4JBcwFT3VdiWAIRUuACWQwrXMq672x7fMuaIaHi7XDGgt1ith23CLfaREmJku9PQcchbt_uEY-hqrFY6ntTtS4paWWQj86xLL94S-Tf6v6xkL918PfLSOTq6XCzxvlFwzBJqApnAhbwqLjpPhgUG04EDRrqrSBc5Y1BLevn6Ip5h1AhessBp3wLkQgz_roeckt-ybvzKTjESMuagnpqLvOT7Y9veIug2MwPJZI2VjczRc1vzMs25XrFQ8DpUy-bNdp89TmvAXwctUMiJdgHloJw23Cv03gIUAkDnsTqZmkpbIf-crpgNKFmQP_EDKoe8p_PXZZgfbRri3NoEVGP7Mk6yEu8LjJhClhZaBNjuWw2-KlBfOA3g79mhfBnkInee5KO9mGR50qPk1V-MorUYNTFMZIm0kFE6eYVWFBwJHLKYhHU34DoiK1VP-svZpC2uAMFNA_UJEwM9CQ2b8qe4-5e9aywMvwcuArRkAB5mBIfOaOJao3mfukKAE D string `json:"d,omitempty" yaml:"d,omitempty"` // dp // Example: G4sPXkc6Ya9y8oJW9_ILj4xuppu0lzi_H7VTkS8xj5SdX3coE0oimYwxIi2emTAue0UOa5dpgFGyBJ4c8tQ2VF402XRugKDTP8akYhFo5tAA77Qe_NmtuYZc3C3m3I24G2GvR5sSDxUyAN2zq8Lfn9EUms6rY3Ob8YeiKkTiBj0 Dp string `json:"dp,omitempty" yaml:"dp,omitempty"` // dq // Example: s9lAH9fggBsoFR8Oac2R_E2gw282rT2kGOAhvIllETE1efrA6huUUvMfBcMpn8lqeW6vzznYY5SSQF7pMdC_agI3nG8Ibp1BUb0JUiraRNqUfLhcQb_d9GF4Dh7e74WbRsobRonujTYN1xCaP6TO61jvWrX-L18txXw494Q_cgk Dq string `json:"dq,omitempty" yaml:"dq,omitempty"` // e // Example: AQAB E string `json:"e,omitempty" yaml:"e,omitempty"` // k // Example: GawgguFyGrWKav7AX4VKUg K string `json:"k,omitempty" yaml:"k,omitempty"` // The "kid" (key ID) parameter is used to match a specific key. This // is used, for instance, to choose among a set of keys within a JWK Set // during key rollover. The structure of the "kid" value is // unspecified. When "kid" values are used within a JWK Set, different // keys within the JWK Set SHOULD use distinct "kid" values. (One // example in which different keys might use the same "kid" value is if // they have different "kty" (key type) values but are considered to be // equivalent alternatives by the application using them.) The "kid" // value is a case-sensitive string. // Example: 1603dfe0af8f4596 Kid string `json:"kid,omitempty" yaml:"kid,omitempty"` // The "kty" (key type) parameter identifies the cryptographic algorithm // family used with the key, such as "RSA" or "EC". "kty" values should // either be registered in the IANA "JSON Web Key Types" registry // established by [JWA] or be a value that contains a Collision- // Resistant Name. The "kty" value is a case-sensitive string. // Example: RSA // Required: true Kty string `json:"kty" yaml:"kty"` // n // Example: vTqrxUyQPl_20aqf5kXHwDZrel-KovIp8s7ewJod2EXHl8tWlRB3_Rem34KwBfqlKQGp1nqah-51H4Jzruqe0cFP58hPEIt6WqrvnmJCXxnNuIB53iX_uUUXXHDHBeaPCSRoNJzNysjoJ30TIUsKBiirhBa7f235PXbKiHducLevV6PcKxJ5cY8zO286qJLBWSPm-OIevwqsIsSIH44Qtm9sioFikhkbLwoqwWORGAY0nl6XvVOlhADdLjBSqSAeT1FPuCDCnXwzCDR8N9IFB_IjdStFkC-rVt2K5BYfPd0c3yFp_vHR15eRd0zJ8XQ7woBC8Vnsac6Et1pKS59pX6256DPWu8UDdEOolKAPgcd_g2NpA76cAaF_jcT80j9KrEzw8Tv0nJBGesuCjPNjGs_KzdkWTUXt23Hn9QJsdc1MZuaW0iqXBepHYfYoqNelzVte117t4BwVp0kUM6we0IqyXClaZgOI8S-WDBw2_Ovdm8e5NmhYAblEVoygcX8Y46oH6bKiaCQfKCFDMcRgChme7AoE1yZZYsPbaG_3IjPrC4LBMHQw8rM9dWjJ8ImjicvZ1pAm0dx-KHCP3y5PVKrxBDf1zSOsBRkOSjB8TPODnJMz6-jd5hTtZxpZPwPoIdCanTZ3ZD6uRBpTmDwtpRGm63UQs1m5FWPwb0T2IF0 N string `json:"n,omitempty" yaml:"n,omitempty"` // p // Example: 6NbkXwDWUhi-eR55Cgbf27FkQDDWIamOaDr0rj1q0f1fFEz1W5A_09YvG09Fiv1AO2-D8Rl8gS1Vkz2i0zCSqnyy8A025XOcRviOMK7nIxE4OH_PEsko8dtIrb3TmE2hUXvCkmzw9EsTF1LQBOGC6iusLTXepIC1x9ukCKFZQvdgtEObQ5kzd9Nhq-cdqmSeMVLoxPLd1blviVT9Vm8-y12CtYpeJHOaIDtVPLlBhJiBoPKWg3vxSm4XxIliNOefqegIlsmTIa3MpS6WWlCK3yHhat0Q-rRxDxdyiVdG_wzJvp0Iw_2wms7pe-PgNPYvUWH9JphWP5K38YqEBiJFXQ P string `json:"p,omitempty" yaml:"p,omitempty"` // q // Example: 0A1FmpOWR91_RAWpqreWSavNaZb9nXeKiBo0DQGBz32DbqKqQ8S4aBJmbRhJcctjCLjain-ivut477tAUMmzJwVJDDq2MZFwC9Q-4VYZmFU4HJityQuSzHYe64RjN-E_NQ02TWhG3QGW6roq6c57c99rrUsETwJJiwS8M5p15Miuz53DaOjv-uqqFAFfywN5WkxHbraBcjHtMiQuyQbQqkCFh-oanHkwYNeytsNhTu2mQmwR5DR2roZ2nPiFjC6nsdk-A7E3S3wMzYYFw7jvbWWoYWo9vB40_MY2Y0FYQSqcDzcBIcq_0tnnasf3VW4Fdx6m80RzOb2Fsnln7vKXAQ Q string `json:"q,omitempty" yaml:"q,omitempty"` // qi // Example: GyM_p6JrXySiz1toFgKbWV-JdI3jQ4ypu9rbMWx3rQJBfmt0FoYzgUIZEVFEcOqwemRN81zoDAaa-Bk0KWNGDjJHZDdDmFhW3AN7lI-puxk_mHZGJ11rxyR8O55XLSe3SPmRfKwZI6yU24ZxvQKFYItdldUKGzO6Ia6zTKhAVRU Qi string `json:"qi,omitempty" yaml:"qi,omitempty"` // Use ("public key use") identifies the intended use of // the public key. The "use" parameter is employed to indicate whether // a public key is used for encrypting data or verifying the signature // on data. Values are commonly "sig" (signature) or "enc" (encryption). // Example: sig Use string `json:"use,omitempty" yaml:"use,omitempty"` // x // Example: f83OJ3D2xF1Bg8vub9tLe1gHMzV76e8Tus9uPHvRVEU X string `json:"x,omitempty" yaml:"x,omitempty"` // The "x5c" (X.509 certificate chain) parameter contains a chain of one // or more PKIX certificates [RFC5280]. The certificate chain is // represented as a JSON array of certificate value strings. Each // string in the array is a base64-encoded (Section 4 of [RFC4648] -- // not base64url-encoded) DER [ITU.X690.1994] PKIX certificate value. // The PKIX certificate containing the key value MUST be the first // certificate. X5c []string `json:"x5c" yaml:"x5c"` // x5t // Example: GawgguFyGrWKav7AX4VKUg X5t string `json:"x5t,omitempty" yaml:"x5t,omitempty"` // x5t s256 // Example: GawgguFyGrWKav7AX4VKUg X5tS256 string `json:"x5t#S256,omitempty" yaml:"x5t#S256,omitempty"` // y // Example: x_FEzRu9m36HLN_tue659LNpXW6pCyStikYjKIWI5a0 Y string `json:"y,omitempty" yaml:"y,omitempty"` }
ClientJWK client j w k
swagger:model ClientJWK
func (*ClientJWK) ContextValidate ¶
ContextValidate validates this client j w k based on context it is used
func (*ClientJWK) MarshalBinary ¶
MarshalBinary interface implementation
func (*ClientJWK) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type ClientJWKs ¶
type ClientJWKs struct { // keys // Example: [] Keys []*ClientJWK `json:"keys" yaml:"keys"` }
ClientJWKs client j w ks
swagger:model ClientJWKs
func (*ClientJWKs) ContextValidate ¶
ContextValidate validate this client j w ks based on the context it is used
func (*ClientJWKs) MarshalBinary ¶
func (m *ClientJWKs) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ClientJWKs) UnmarshalBinary ¶
func (m *ClientJWKs) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ClientPrivacy ¶
type ClientPrivacy struct { // optional privacy information mapping for scopes Scopes map[string]ScopePrivacyInformation `json:"scopes,omitempty" yaml:"scopes,omitempty"` }
ClientPrivacy client privacy
swagger:model ClientPrivacy
func (*ClientPrivacy) ContextValidate ¶
ContextValidate validate this client privacy based on the context it is used
func (*ClientPrivacy) MarshalBinary ¶
func (m *ClientPrivacy) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ClientPrivacy) UnmarshalBinary ¶
func (m *ClientPrivacy) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ClientTokenExchangeConfiguration ¶
type ClientTokenExchangeConfiguration struct { // Additional actor token claims // // Claims from the actor token that will be injected into the exchanged token under the `act` claim. // // Applies for the token exchange delegation flow only. ActorClaims []string `json:"actor_claims" yaml:"actor_claims"` }
ClientTokenExchangeConfiguration client token exchange configuration
swagger:model ClientTokenExchangeConfiguration
func (*ClientTokenExchangeConfiguration) ContextValidate ¶
func (m *ClientTokenExchangeConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this client token exchange configuration based on context it is used
func (*ClientTokenExchangeConfiguration) MarshalBinary ¶
func (m *ClientTokenExchangeConfiguration) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ClientTokenExchangeConfiguration) UnmarshalBinary ¶
func (m *ClientTokenExchangeConfiguration) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ClientsForAdmin ¶
type ClientsForAdmin struct { // clients Clients []*ClientAdminResponse `json:"clients" yaml:"clients"` }
ClientsForAdmin clients for admin
swagger:model ClientsForAdmin
func (*ClientsForAdmin) ContextValidate ¶
ContextValidate validate this clients for admin based on the context it is used
func (*ClientsForAdmin) MarshalBinary ¶
func (m *ClientsForAdmin) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ClientsForAdmin) UnmarshalBinary ¶
func (m *ClientsForAdmin) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CognitoCredentials ¶
type CognitoCredentials struct { // Cognito app client secret from your application settings ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"` }
CognitoCredentials Cognito IDP specific settings
swagger:model CognitoCredentials
func (*CognitoCredentials) ContextValidate ¶
ContextValidate validates this cognito credentials based on context it is used
func (*CognitoCredentials) MarshalBinary ¶
func (m *CognitoCredentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CognitoCredentials) UnmarshalBinary ¶
func (m *CognitoCredentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CognitoIDP ¶
type CognitoIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // credentials Credentials *CognitoCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // settings Settings *CognitoSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
CognitoIDP cognito ID p
swagger:model CognitoIDP
func (*CognitoIDP) ContextValidate ¶
ContextValidate validate this cognito ID p based on the context it is used
func (*CognitoIDP) MarshalBinary ¶
func (m *CognitoIDP) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CognitoIDP) UnmarshalBinary ¶
func (m *CognitoIDP) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CognitoSettings ¶
type CognitoSettings struct { // Cognito app client ID from your application settings // Example: client ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // If enabled, additional user data is collected from the `userinfo` Cognito API GetUserInfo bool `json:"get_user_info,omitempty" yaml:"get_user_info,omitempty"` // Cognito pool ID // // A user pool is a user directory in Amazon Cognito. It enables your users to sign in to your // application through Amazon Cognito. You can find your pool ID in your User Pools > Federated // Identities settings. PoolID string `json:"pool_id,omitempty" yaml:"pool_id,omitempty"` // AWS Region where the user pool is hosted // Example: us-east-1 Region string `json:"region,omitempty" yaml:"region,omitempty"` // An array of allowed OAuth scopes which the client requests // // The following scopes can be allowed for a Cognito application: // `phone`, `email`, `openid`, `aws.cognito.signin.user.admin`, `profile`. // Example: ["email","profile","openid"] Scopes []string `json:"scopes" yaml:"scopes"` // Whether to send the identifier as a `login_hint` parameter to the IDP SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"` }
CognitoSettings Cognito IDP specific settings
swagger:model CognitoSettings
func (*CognitoSettings) ContextValidate ¶
ContextValidate validates this cognito settings based on context it is used
func (*CognitoSettings) MarshalBinary ¶
func (m *CognitoSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CognitoSettings) UnmarshalBinary ¶
func (m *CognitoSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ConfigImportEventPayload ¶
type ConfigImportEventPayload struct { // error message ErrorMessage string `json:"error_message,omitempty" yaml:"error_message,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // workspace id WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
ConfigImportEventPayload config import event payload
swagger:model ConfigImportEventPayload
func (*ConfigImportEventPayload) ContextValidate ¶
func (m *ConfigImportEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this config import event payload based on context it is used
func (*ConfigImportEventPayload) MarshalBinary ¶
func (m *ConfigImportEventPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ConfigImportEventPayload) UnmarshalBinary ¶
func (m *ConfigImportEventPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Confirmation ¶
type Confirmation struct { // jkt Jkt string `json:"jkt,omitempty" yaml:"jkt,omitempty"` // x5t s256 X5tS256 string `json:"x5t#S256,omitempty" yaml:"x5t#S256,omitempty"` }
Confirmation confirmation
swagger:model Confirmation
func (*Confirmation) ContextValidate ¶
ContextValidate validates this confirmation based on context it is used
func (*Confirmation) MarshalBinary ¶
func (m *Confirmation) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*Confirmation) UnmarshalBinary ¶
func (m *Confirmation) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Consent ¶
type Consent struct { // flag determining if can user withdrawn consent // Example: false CanBeWithdrawn bool `json:"can_be_withdrawn,omitempty" yaml:"can_be_withdrawn,omitempty"` // consent description // Example: End User License Agreement Description string `json:"description,omitempty" yaml:"description,omitempty"` // consent unique identifier // Example: 1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // internal services InternalServices []*ConsentService `json:"internal_services" yaml:"internal_services"` // consent name // Example: EULA Name string `json:"name,omitempty" yaml:"name,omitempty"` // PII Categories PiiCategories []*PIICategory `json:"pii_categories" yaml:"pii_categories"` // tenant id // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // third party services ThirdPartyServices []*ConsentService `json:"third_party_services" yaml:"third_party_services"` // strategy for upading existing grants, one of: explicitAll, implicitAll, keepCurrent // Example: explicitAll UpdateExistingGrants string `json:"update_existing_grants,omitempty" yaml:"update_existing_grants,omitempty"` // marks the time from which the consent is in use. Can't be set to a future time // Example: 2019-12-11T13:44:28.772101Z // Format: date-time ValidFrom strfmt.DateTime `json:"valid_from,omitempty" yaml:"valid_from,omitempty"` // consent version. When a consent is updated, version is incremented. // Example: 1 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` }
Consent consent
swagger:model Consent
func (*Consent) ContextValidate ¶
ContextValidate validate this consent based on the context it is used
func (*Consent) MarshalBinary ¶
MarshalBinary interface implementation
func (*Consent) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type ConsentAction ¶
type ConsentAction struct { // consent description // Example: Consents required by application X Description string `json:"description,omitempty" yaml:"description,omitempty"` // unique consent action id // Example: 1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // consent action name // Example: application_x Name string `json:"name,omitempty" yaml:"name,omitempty"` // tenant id // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` }
ConsentAction consent action
swagger:model ConsentAction
func (*ConsentAction) ContextValidate ¶
ContextValidate validates this consent action based on context it is used
func (*ConsentAction) MarshalBinary ¶
func (m *ConsentAction) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ConsentAction) UnmarshalBinary ¶
func (m *ConsentAction) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ConsentActionToConsent ¶
type ConsentActionToConsent struct { // flag determining if can user withdrawn consent // Example: false CanBeWithdrawn bool `json:"can_be_withdrawn,omitempty" yaml:"can_be_withdrawn,omitempty"` // consent description // Example: End User License Agreement Description string `json:"description,omitempty" yaml:"description,omitempty"` // consent unique identifier // Example: 1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // internal services InternalServices []*ConsentService `json:"internal_services" yaml:"internal_services"` // consent name // Example: EULA Name string `json:"name,omitempty" yaml:"name,omitempty"` // PII Categories PiiCategories []*PIICategory `json:"pii_categories" yaml:"pii_categories"` // is consent required // Example: false Required bool `json:"required,omitempty" yaml:"required,omitempty"` // tenant id // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // third party services ThirdPartyServices []*ConsentService `json:"third_party_services" yaml:"third_party_services"` // strategy for upading existing grants, one of: explicitAll, implicitAll, keepCurrent // Example: explicitAll UpdateExistingGrants string `json:"update_existing_grants,omitempty" yaml:"update_existing_grants,omitempty"` // marks the time from which the consent is in use. Can't be set to a future time // Example: 2019-12-11T13:44:28.772101Z // Format: date-time ValidFrom strfmt.DateTime `json:"valid_from,omitempty" yaml:"valid_from,omitempty"` // consent version. When a consent is updated, version is incremented. // Example: 1 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` }
ConsentActionToConsent consent action to consent
swagger:model ConsentActionToConsent
func (*ConsentActionToConsent) ContextValidate ¶
func (m *ConsentActionToConsent) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this consent action to consent based on the context it is used
func (*ConsentActionToConsent) MarshalBinary ¶
func (m *ConsentActionToConsent) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ConsentActionToConsent) UnmarshalBinary ¶
func (m *ConsentActionToConsent) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ConsentActionWithConsents ¶
type ConsentActionWithConsents struct { // consents Consents []*ConsentActionToConsent `json:"consents" yaml:"consents"` // consent description // Example: Consents required by application X Description string `json:"description,omitempty" yaml:"description,omitempty"` // unique consent action id // Example: 1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // consent action name // Example: application_x Name string `json:"name,omitempty" yaml:"name,omitempty"` // tenant id // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` }
ConsentActionWithConsents consent action with consents
swagger:model ConsentActionWithConsents
func (*ConsentActionWithConsents) ContextValidate ¶
func (m *ConsentActionWithConsents) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this consent action with consents based on the context it is used
func (*ConsentActionWithConsents) MarshalBinary ¶
func (m *ConsentActionWithConsents) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ConsentActionWithConsents) UnmarshalBinary ¶
func (m *ConsentActionWithConsents) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ConsentActions ¶
type ConsentActions struct { // consent actions ConsentActions []*ConsentAction `json:"consent_actions" yaml:"consent_actions"` }
ConsentActions consent actions
swagger:model ConsentActions
func (*ConsentActions) ContextValidate ¶
ContextValidate validate this consent actions based on the context it is used
func (*ConsentActions) MarshalBinary ¶
func (m *ConsentActions) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ConsentActions) UnmarshalBinary ¶
func (m *ConsentActions) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ConsentAuditEventPayload ¶
type ConsentAuditEventPayload struct { // consent Consent *ConsentPayload `json:"consent,omitempty" yaml:"consent,omitempty"` }
ConsentAuditEventPayload consent audit event payload
swagger:model ConsentAuditEventPayload
func (*ConsentAuditEventPayload) ContextValidate ¶
func (m *ConsentAuditEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this consent audit event payload based on the context it is used
func (*ConsentAuditEventPayload) MarshalBinary ¶
func (m *ConsentAuditEventPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ConsentAuditEventPayload) UnmarshalBinary ¶
func (m *ConsentAuditEventPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ConsentDetails ¶
type ConsentDetails struct { // br Br *BRConsentPayload `json:"br,omitempty" yaml:"br,omitempty"` // cdr Cdr *CDRArrangement `json:"cdr,omitempty" yaml:"cdr,omitempty"` // cdr previous CdrPrevious *CDRArrangement `json:"cdr_previous,omitempty" yaml:"cdr_previous,omitempty"` // fdx Fdx *FDXConsent `json:"fdx,omitempty" yaml:"fdx,omitempty"` // uk Uk *UKConsentPayload `json:"uk,omitempty" yaml:"uk,omitempty"` }
ConsentDetails consent details
swagger:model ConsentDetails
func (*ConsentDetails) ContextValidate ¶
ContextValidate validate this consent details based on the context it is used
func (*ConsentDetails) MarshalBinary ¶
func (m *ConsentDetails) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ConsentDetails) UnmarshalBinary ¶
func (m *ConsentDetails) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ConsentGrantContext ¶
type ConsentGrantContext struct { // json object - device print of the End User's device Device map[string]interface{} `json:"device,omitempty" yaml:"device,omitempty"` // string in the form of a valid IP v 4 address, represents the current IP of the End User // Example: 52.14.142.76 IP string `json:"ip,omitempty" yaml:"ip,omitempty"` // 2 element array of floats - current geolocation of the end-user, the format is [lat, long] // Example: [25.2084,55.2719] Location []float64 `json:"location" yaml:"location"` }
ConsentGrantContext consent grant context
swagger:model ConsentGrantContext
func (*ConsentGrantContext) ContextValidate ¶
ContextValidate validates this consent grant context based on context it is used
func (*ConsentGrantContext) MarshalBinary ¶
func (m *ConsentGrantContext) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ConsentGrantContext) UnmarshalBinary ¶
func (m *ConsentGrantContext) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ConsentGrantedEvent ¶
type ConsentGrantedEvent struct { // time when the grant occurred // Example: 1257894000000000000 CollectionTimestamp int64 `json:"collection_timestamp,omitempty" yaml:"collection_timestamp,omitempty"` // consent Consent *Consent `json:"consent,omitempty" yaml:"consent,omitempty"` // consent grant id // Example: 27fa83a8-d0a6-48da-8529-42105bfa0ede ConsentGrantActID string `json:"consent_grant_act_id,omitempty" yaml:"consent_grant_act_id,omitempty"` // consent id // Example: 1 ConsentID string `json:"consent_id,omitempty" yaml:"consent_id,omitempty"` // context Context *ConsentGrantContext `json:"context,omitempty" yaml:"context,omitempty"` // given at timestamp // Format: date-time GivenAt strfmt.DateTime `json:"given_at,omitempty" yaml:"given_at,omitempty"` // grant type, one of: implicit, explicit // Example: implicit GrantType string `json:"grant_type,omitempty" yaml:"grant_type,omitempty"` // language in which the consent was obtained [ISO 639] // Example: en Language string `json:"language,omitempty" yaml:"language,omitempty"` // subject // Example: peter Subject string `json:"subject,omitempty" yaml:"subject,omitempty"` // tenant id // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // optional string with action_id - can be set if the consent grant/withdraw request was caused when an app asked the user for consent required for a specific action // Example: 1 TriggeredByAction string `json:"triggered_by_action,omitempty" yaml:"triggered_by_action,omitempty"` // version // Example: 1 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` }
ConsentGrantedEvent consent granted event
swagger:model ConsentGrantedEvent
func (*ConsentGrantedEvent) ContextValidate ¶
ContextValidate validate this consent granted event based on the context it is used
func (*ConsentGrantedEvent) MarshalBinary ¶
func (m *ConsentGrantedEvent) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ConsentGrantedEvent) UnmarshalBinary ¶
func (m *ConsentGrantedEvent) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ConsentNotifiedPayload ¶
type ConsentNotifiedPayload struct { // Type of notification, specifies what the client was notified of , e.g.: revocation NotificationType string `json:"notification_type,omitempty" yaml:"notification_type,omitempty"` // payload of the request sent to the notification endpoint Payload string `json:"payload,omitempty" yaml:"payload,omitempty"` // uri that was notified of the revocation URI string `json:"uri,omitempty" yaml:"uri,omitempty"` }
ConsentNotifiedPayload consent notified payload
swagger:model ConsentNotifiedPayload
func (*ConsentNotifiedPayload) ContextValidate ¶
func (m *ConsentNotifiedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this consent notified payload based on context it is used
func (*ConsentNotifiedPayload) MarshalBinary ¶
func (m *ConsentNotifiedPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ConsentNotifiedPayload) UnmarshalBinary ¶
func (m *ConsentNotifiedPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ConsentPayload ¶
type ConsentPayload struct { // details Details *ConsentDetails `json:"details,omitempty" yaml:"details,omitempty"` // consent id ID string `json:"id,omitempty" yaml:"id,omitempty"` // kind Kind AuditConsentKind `json:"kind,omitempty" yaml:"kind,omitempty"` // Type of a consent, specifies the subject of consent, e.g.: domestic_payment Type string `json:"type,omitempty" yaml:"type,omitempty"` }
ConsentPayload consent payload
swagger:model ConsentPayload
func (*ConsentPayload) ContextValidate ¶
ContextValidate validate this consent payload based on the context it is used
func (*ConsentPayload) MarshalBinary ¶
func (m *ConsentPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ConsentPayload) UnmarshalBinary ¶
func (m *ConsentPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ConsentRevokedEvent ¶
type ConsentRevokedEvent struct { // time when the grant occurred // Example: 1257894000000000000 CollectionTimestamp int64 `json:"collection_timestamp,omitempty" yaml:"collection_timestamp,omitempty"` // consent Consent *Consent `json:"consent,omitempty" yaml:"consent,omitempty"` // consent grant id // Example: 27fa83a8-d0a6-48da-8529-42105bfa0ede ConsentGrantActID string `json:"consent_grant_act_id,omitempty" yaml:"consent_grant_act_id,omitempty"` // consent id // Example: 1 ConsentID string `json:"consent_id,omitempty" yaml:"consent_id,omitempty"` // context Context *ConsentGrantContext `json:"context,omitempty" yaml:"context,omitempty"` // given at timestamp // Format: date-time GivenAt strfmt.DateTime `json:"given_at,omitempty" yaml:"given_at,omitempty"` // grant type, one of: implicit, explicit // Example: implicit GrantType string `json:"grant_type,omitempty" yaml:"grant_type,omitempty"` // language in which the consent was obtained [ISO 639] // Example: en Language string `json:"language,omitempty" yaml:"language,omitempty"` // subject // Example: peter Subject string `json:"subject,omitempty" yaml:"subject,omitempty"` // tenant id // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // optional string with action_id - can be set if the consent grant/withdraw request was caused when an app asked the user for consent required for a specific action // Example: 1 TriggeredByAction string `json:"triggered_by_action,omitempty" yaml:"triggered_by_action,omitempty"` // version // Example: 1 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` }
ConsentRevokedEvent consent revoked event
swagger:model ConsentRevokedEvent
func (*ConsentRevokedEvent) ContextValidate ¶
ContextValidate validate this consent revoked event based on the context it is used
func (*ConsentRevokedEvent) MarshalBinary ¶
func (m *ConsentRevokedEvent) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ConsentRevokedEvent) UnmarshalBinary ¶
func (m *ConsentRevokedEvent) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ConsentService ¶
type ConsentService struct { // name Name string `json:"name,omitempty" yaml:"name,omitempty"` // purpose Purposes []*Purpose `json:"purposes" yaml:"purposes"` }
ConsentService consent service
swagger:model ConsentService
func (*ConsentService) ContextValidate ¶
ContextValidate validate this consent service based on the context it is used
func (*ConsentService) MarshalBinary ¶
func (m *ConsentService) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ConsentService) UnmarshalBinary ¶
func (m *ConsentService) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ConsentStatus ¶
type ConsentStatus string
ConsentStatus consent status
swagger:model ConsentStatus
func (ConsentStatus) ContextValidate ¶
ContextValidate validates this consent status based on context it is used
type ConsentType ¶
type ConsentType string
ConsentType consent type
swagger:model ConsentType
func (ConsentType) ContextValidate ¶
ContextValidate validates this consent type based on context it is used
type Consents ¶
type Consents struct { // list of consents Consents []*Consent `json:"consents" yaml:"consents"` }
Consents consents
swagger:model Consents
func (*Consents) ContextValidate ¶
ContextValidate validate this consents based on the context it is used
func (*Consents) MarshalBinary ¶
MarshalBinary interface implementation
func (*Consents) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type ContactPerson ¶
type ContactPerson struct { // company Company string `json:"Company,omitempty" yaml:"Company,omitempty"` // contact type ContactType string `json:"ContactType,omitempty" yaml:"ContactType,omitempty"` // email addresses EmailAddresses []string `json:"EmailAddresses" yaml:"EmailAddresses"` // given name GivenName string `json:"GivenName,omitempty" yaml:"GivenName,omitempty"` // sur name SurName string `json:"SurName,omitempty" yaml:"SurName,omitempty"` // telephone numbers TelephoneNumbers []string `json:"TelephoneNumbers" yaml:"TelephoneNumbers"` }
ContactPerson ContactPerson represents the SAML element ContactPerson.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.3.2.2
swagger:model ContactPerson
func (*ContactPerson) ContextValidate ¶
ContextValidate validates this contact person based on context it is used
func (*ContactPerson) MarshalBinary ¶
func (m *ContactPerson) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ContactPerson) UnmarshalBinary ¶
func (m *ContactPerson) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CookiesConfiguration ¶
type CookiesConfiguration struct { // same site SameSite SameSite `json:"same_site,omitempty" yaml:"same_site,omitempty"` }
CookiesConfiguration cookies configuration
swagger:model CookiesConfiguration
func (*CookiesConfiguration) ContextValidate ¶
ContextValidate validate this cookies configuration based on the context it is used
func (*CookiesConfiguration) MarshalBinary ¶
func (m *CookiesConfiguration) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CookiesConfiguration) UnmarshalBinary ¶
func (m *CookiesConfiguration) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CreateClientAdminRequest ¶
type CreateClientAdminRequest struct { // Application URL AppURL string `json:"app_url,omitempty" yaml:"app_url,omitempty"` // The client application type. // // Client applications can be either of a `web` or `native` types. // // Web applications include clients like server web applications or service apps. // // Native applications include single-page applications (SPAs) and mobile or desktop // applications. // // Apply security measures according to the type of your application. // Example: web ApplicationType string `json:"application_type,omitempty" yaml:"application_type,omitempty"` // An array of dynamically calculated application types that can be used for filtering // Example: ["single_page","server_web","mobile_desktop","service","legacy","dcr"] // Read Only: true ApplicationTypes []string `json:"application_types" yaml:"application_types"` // Identity of the intended recipients (the audience). // // Typically, the audience is a single resource server or a list of resource servers. // // It is considered a good practice to limit the audience of the token for security purposes. Audience []string `json:"audience" yaml:"audience"` // Authorization details types // // Indicates what authorization details types the client can use. AuthorizationDetailsTypes []AuthorizationDetailType `json:"authorization_details_types" yaml:"authorization_details_types"` // Algorithm used for encrypting authorization responses. // // If both signing and encryption are requested, the response is first signed, and then encrypted. // As a result, a Nested JWT is obtained, as defined in JWT [RFC7519]. // // If omitted, no encryption is applied by default. // Example: RSA-OAEP-256 // Enum: ["RSA-OAEP","RSA-OAEP-256"] AuthorizationEncryptedResponseAlg string `json:"authorization_encrypted_response_alg,omitempty" yaml:"authorization_encrypted_response_alg,omitempty"` // Algorithm used for encrypting authorization responses. // // With `authorization_encrypted_response_alg` specified, the default value is `A128CBC-HS256`. // When `authorization_encrypted_response_enc` is included, `authorization_encrypted_response_alg` // MUST also be provided in a request. // Example: A128CBC-HS256 // Enum: ["A256GCM","A128CBC-HS256"] AuthorizationEncryptedResponseEnc string `json:"authorization_encrypted_response_enc,omitempty" yaml:"authorization_encrypted_response_enc,omitempty"` // An authorization server (workspace) identifier holding the client application. // Example: default // Required: true AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"` // Algorithm used for signing authorization responses. // // With this parameter specified, the response is signed using JWS and according to the configured algorithm. // // `none` isn't allowed. // Example: RS256 AuthorizationSignedResponseAlg string `json:"authorization_signed_response_alg,omitempty" yaml:"authorization_signed_response_alg,omitempty"` // OPTIONAL. The JWS alg algorithm value used by the client application to sign authentication requests. // // When omitted, the client application doesn't send signed authentication requests. BackchannelAuthenticationRequestSigningAlg string `` /* 127-byte string literal not displayed */ // REQUIRED for requests when the client application uses CIBA as an authorization grant type, and the token // delivery mode is set to `ping` or `push`. // // This parameter is the endpoint where an OP (OpenID Provider) posts a notification after end-user authentication. // // Input: an HTTPS URL. BackchannelClientNotificationEndpoint string `json:"backchannel_client_notification_endpoint,omitempty" yaml:"backchannel_client_notification_endpoint,omitempty"` // Boolean value specifying whether the RP requires that a sid (session ID) claim be included in the Logout Token to identify the RP session with the OP when the backchannel_logout_uri is used. BackchannelLogoutSessionRequired bool `json:"backchannel_logout_session_required,omitempty" yaml:"backchannel_logout_session_required,omitempty"` // RP URL that will cause the RP to log itself out when sent a Logout Token by the OP. BackchannelLogoutURI string `json:"backchannel_logout_uri,omitempty" yaml:"backchannel_logout_uri,omitempty"` // REQUIRED for requests when the client application uses CIBA as an authorization grant type. // // Input: `poll`, `ping`, or `push`. BackchannelTokenDeliveryMode string `json:"backchannel_token_delivery_mode,omitempty" yaml:"backchannel_token_delivery_mode,omitempty"` // OPTIONAL. A boolean value indicating the `user_code` parameter support by the client application. // // If omitted, the default value is `false`. // // This applies only when the `backchannel_user_code_parameter_supported` OP parameter is `true`. BackchannelUserCodeParameter bool `json:"backchannel_user_code_parameter,omitempty" yaml:"backchannel_user_code_parameter,omitempty"` // OAuth client application identifier // // If not provided, a random client ID is generated. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // The client identifier time of issue. // // The value is the number of seconds between 1970-01-01T00:00:00Z (UTC) and the date/time of issue. ClientIDIssuedAt int64 `json:"client_id_issued_at,omitempty" yaml:"client_id_issued_at,omitempty"` // Human-readable name of a client application. // Example: My app ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"` // OAuth client secret // // If not provided, a random client secret is generated. // Min Length: 32 ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"` // The client secret expiration time. // // If the client secret does not expire, `client_secret_expires_at` = `0`. ClientSecretExpiresAt int64 `json:"client_secret_expires_at,omitempty" yaml:"client_secret_expires_at,omitempty"` // Defines whether the client application is active or not. // // Only clients with the `Active` status can preform authorization, authentication, and PAR requests. // Enum: ["active","inactive"] ClientStatus string `json:"client_status,omitempty" yaml:"client_status,omitempty"` // client type // Enum: ["oauth2","saml"] ClientType string `json:"client_type,omitempty" yaml:"client_type,omitempty"` // URI of a client application. ClientURI string `json:"client_uri,omitempty" yaml:"client_uri,omitempty"` // Date when the client application was created. // Example: 2022-04-07T19:17:31.323187Z // Format: date-time CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"` // default ACR values // list of ACR values that will be implicitly requested for the client if not explicitly specified DefaultAcrValues []string `json:"default_acr_values" yaml:"default_acr_values"` // Description of the client application. Description string `json:"description,omitempty" yaml:"description,omitempty"` // Optional developer owner of the client application. DeveloperID string `json:"developer_id,omitempty" yaml:"developer_id,omitempty"` // developer metadata DeveloperMetadata Metadata `json:"developer_metadata,omitempty" yaml:"developer_metadata,omitempty"` // Boolean value specifying whether the client always uses DPoP for token requests // If true, the authorization server will reject token requests from this client that do not contain the DPoP header. DpopBoundAccessTokens bool `json:"dpop_bound_access_tokens,omitempty" yaml:"dpop_bound_access_tokens,omitempty"` // fdx Fdx *FDXMetadata `json:"fdx,omitempty" yaml:"fdx,omitempty"` // An array of allowed OAuth client grant types. // // The `grantTypes` array stores OAuth flows that are allowed for a given client application. // // [Read more](https://cloudentity.com/developers/basics/oauth-grant-types/grant-types-overview/) about grant types. // Example: ["password","refresh_token","client_credentials","implicit","authorization_code"] GrantTypes []string `json:"grant_types" yaml:"grant_types"` // An array of hashed rotated client secrets HashedRotatedSecrets []string `json:"hashed_rotated_secrets" yaml:"hashed_rotated_secrets"` // Hashed client secret // // Hashing client secrets provides additional security for your secrets storage as it hides // plaintext secrets from being viewed both in the UI and the database. HashedSecret string `json:"hashed_secret,omitempty" yaml:"hashed_secret,omitempty"` // JWE alg algorithm for encrypting the ID token issued to this client application. // Enum: ["RSA-OAEP","RSA-OAEP-256"] IDTokenEncryptedResponseAlg string `json:"id_token_encrypted_response_alg,omitempty" yaml:"id_token_encrypted_response_alg,omitempty"` // JWE enc algorithm for encrypting the ID token issued to this client application. // Enum: ["A256GCM","A128CBC-HS256"] IDTokenEncryptedResponseEnc string `json:"id_token_encrypted_response_enc,omitempty" yaml:"id_token_encrypted_response_enc,omitempty"` // Algorithm for signing ID tokens issued for a client application. // // The default value depends on authorization server configuration. // Example: ES256 // Enum: ["RS256","ES256","PS256"] IDTokenSignedResponseAlg string `json:"id_token_signed_response_alg,omitempty" yaml:"id_token_signed_response_alg,omitempty"` // An introspection endpoint authentication method configured for the client application (read-only). // // If empty, the `token_endpoint_auth_method` is used. // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none"] IntrospectionEndpointAuthMethod string `json:"introspection_endpoint_auth_method,omitempty" yaml:"introspection_endpoint_auth_method,omitempty"` // jwks Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"` // A URL of JSON Web Key Set with the public keys used by a client application to authenticate to Cloudentity. JwksURI string `json:"jwks_uri,omitempty" yaml:"jwks_uri,omitempty"` // Logo URI. LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // metadata Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // External organization identifier. It is a unique string assigned by the CDR Register to identify an Accredited // Data Recipient Brand. // // The value obtained is used as the `aud` claim for message signing, for example, when a JSON Web Token (JWT) is // required for authorization, and represents the audience(s) the JWT is intended for. // Example: 5647fe90-f6bc-11eb-9a03-0242ac130003 OrganisationID string `json:"organisation_id,omitempty" yaml:"organisation_id,omitempty"` // Policy URL to read about how the profile data is used. PolicyURI string `json:"policy_uri,omitempty" yaml:"policy_uri,omitempty"` // Array of URLs to which a relying party may request that the user be redirected after a logout has been performed. PostLogoutRedirectUris []string `json:"post_logout_redirect_uris" yaml:"post_logout_redirect_uris"` // privacy Privacy *ClientPrivacy `json:"privacy,omitempty" yaml:"privacy,omitempty"` // redirect uris RedirectUris RedirectURIs `json:"redirect_uris,omitempty" yaml:"redirect_uris,omitempty"` // Optional JWE alg algorithm the client is declaring that it may use for encrypting Request Objects // Example: RSA-OAEP // Enum: ["RSA-OAEP","RSA-OAEP-256"] RequestObjectEncryptionAlg string `json:"request_object_encryption_alg,omitempty" yaml:"request_object_encryption_alg,omitempty"` // Optional JWE enc algorithm the client is declaring that it may use for encrypting Request Objects // When `request_object_encryption_enc` is included, `request_object_encryption_alg` MUST also be provided. // Example: A256GCM // Enum: ["A256GCM","A128CBC-HS256"] RequestObjectEncryptionEnc string `json:"request_object_encryption_enc,omitempty" yaml:"request_object_encryption_enc,omitempty"` // Request object signing algorithm for the token endpoint // // Cloudentity supports signing tokens with the RS256, ES256, and PS256 algorithms. If you do not want // to use a signing algorithm, set the value of this parameter to `none`. // Example: none // Enum: ["any","none","RS256","ES256","PS256"] RequestObjectSigningAlg string `json:"request_object_signing_alg,omitempty" yaml:"request_object_signing_alg,omitempty"` // Array of absolute URIs that points to the Request Object that holds authorization request parameters. RequestUris []string `json:"request_uris" yaml:"request_uris"` // Boolean parameter indicating whether the only means of initiating an authorization request the client is allowed to use is PAR. RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"` // response types ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"` // A revocation endpoint authentication method configured for the client application (read-only). // If empty, the `token_endpoint_auth_method` is used. // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none"] RevocationEndpointAuthMethod string `json:"revocation_endpoint_auth_method,omitempty" yaml:"revocation_endpoint_auth_method,omitempty"` // An array of rotated OAuth client secrets RotatedSecrets []string `json:"rotated_secrets" yaml:"rotated_secrets"` // Space-separated list of scopes for compatibility with the OAuth specification. // Example: email offline_access openid Scope string `json:"scope,omitempty" yaml:"scope,omitempty"` // An array of string represented scopes assigned to a client application // Example: ["email","offline_access","openid"] Scopes []string `json:"scopes" yaml:"scopes"` // OPTIONAL. [A URL using the HTTPS scheme](https://openid.net/specs/openid-connect-registration-1_0.html#SectorIdentifierValidation). // It must reference a JSON file with the array of `redirect_uri` values. // // Pass this parameter when you use multiple domains in your `redirect_uris` or need a mechanism to allow changes in // domain without affecting consumer consent. // // [Read more](https://openid.net/specs/openid-connect-core-1_0.html) SectorIdentifierURI string `json:"sector_identifier_uri,omitempty" yaml:"sector_identifier_uri,omitempty"` // A digitally signed or MACed JSON Web Token (JWT) [RFC7519] that // asserts metadata values about the client software. In some cases, // a software statement is issued directly by the client // developer. In other cases, a software statement is issued by // a third-party organization for use by the client developer. // // In both cases, the trust relationship the authorization server has // with the issuer of the software statement is intended to be used // as an input to the evaluation of whether the registration request // is accepted. // // A software statement can be presented to an // authorization server as part of the client registration request. SoftwareStatement string `json:"software_statement,omitempty" yaml:"software_statement,omitempty"` // software statement payload SoftwareStatementPayload Metadata `json:"software_statement_payload,omitempty" yaml:"software_statement_payload,omitempty"` // Subject identifier type // // Stores information if the subject identifier is of the `public` or the `pairwise` type. // // Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer, // and are intended to be consumed by client applications. There are two types // of subject identifiers: `public` and `pairwise`. // // For the `public` type, the value of the `sub` (subject) token claim is the same for all clients. // // For the `pairwise` type, a different `sub` (subject) token claim is provided for each client. // Using the `pairwise` subject identifier makes it impossible for client applications to correlate the end-user's // activity without their permission. // Example: public // Enum: ["public","pairwise"] SubjectType string `json:"subject_type,omitempty" yaml:"subject_type,omitempty"` // Defines whether the client application is a system tenant's application or not. System bool `json:"system,omitempty" yaml:"system,omitempty"` // ID of a tenant where the client application is added // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // A string containing the value of an expected dNSName SAN entry in the certificate. TLSClientAuthSanDNS string `json:"tls_client_auth_san_dns,omitempty" yaml:"tls_client_auth_san_dns,omitempty"` // A string containing the value of an expected rfc822Name SAN entry in the certificate. TLSClientAuthSanEmail string `json:"tls_client_auth_san_email,omitempty" yaml:"tls_client_auth_san_email,omitempty"` // A string representation of an IP address in either dotted decimal notation (for IPv4) or colon-delimited hexadecimal (for IPv6, as defined in [RFC5952]) that is expected to be present as an iPAddress SAN entry in the certificate. TLSClientAuthSanIP string `json:"tls_client_auth_san_ip,omitempty" yaml:"tls_client_auth_san_ip,omitempty"` // A string containing the value of an expected uniformResourceIdentifier SAN entry in the certificate. TLSClientAuthSanURI string `json:"tls_client_auth_san_uri,omitempty" yaml:"tls_client_auth_san_uri,omitempty"` // An [RFC4514] string representation of the expected subject distinguished name of the certificate. TLSClientAuthSubjectDn string `json:"tls_client_auth_subject_dn,omitempty" yaml:"tls_client_auth_subject_dn,omitempty"` // Boolean value indicating server support for mutual TLS client certificate-bound access tokens. If omitted, the default value is "false". TLSClientCertificateBoundAccessTokens bool `json:"tls_client_certificate_bound_access_tokens,omitempty" yaml:"tls_client_certificate_bound_access_tokens,omitempty"` // Token endpoint authentication method configured for a client application // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // To learn more, go to the Authorization Basics > Client Authentication section of this guide. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none","unspecified"] TokenEndpointAuthMethod string `json:"token_endpoint_auth_method,omitempty" yaml:"token_endpoint_auth_method,omitempty"` // Signing algorithm for the token endpoint // // This field is optional. If empty, a client can use any algorithm supported by the server (see `token_endpoint_auth_signing_alg_values_supported` in the well-known endpoing). // // If provided, depending on the server configuration, client can use of one: HS256, RS256, ES256, PS256 algorithms. // // If your token endpoint authentication is set to the `private_key_jwt` method, the // `token_endpoint_auth_signing_alg` parameter must be either RS256, ES256, or PS256. // // If your token endpoint authentication is set to the `client_secret_jwt` method, // the `token_endpoint_auth_signing_alg` parameter must be HS256. // Example: ES256 // Enum: ["RS256","ES256","PS256","HS256",""] TokenEndpointAuthSigningAlg string `json:"token_endpoint_auth_signing_alg,omitempty" yaml:"token_endpoint_auth_signing_alg,omitempty"` // token exchange TokenExchange *ClientTokenExchangeConfiguration `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"` // token ttls TokenTtls *TokenTTLs `json:"token_ttls,omitempty" yaml:"token_ttls,omitempty"` // Terms of Service URL. TosURI string `json:"tos_uri,omitempty" yaml:"tos_uri,omitempty"` // Defines whether the client application is trusted or not. // // For trusted clients, consent pages are skipped during the authorization process. Trusted bool `json:"trusted,omitempty" yaml:"trusted,omitempty"` // Date when the client application was updated. // Example: 2022-05-08T01:11:51.1262916Z // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"` // If enabled the client application will be able to set its own token TTLs. UseCustomTokenTtls bool `json:"use_custom_token_ttls,omitempty" yaml:"use_custom_token_ttls,omitempty"` // JWS alg algorithm REQUIRED for signing UserInfo Responses. // // If specified, the response is a JWT serialized and signed with JWS. // // If omitted, then by default, UserInfo Response returns the Claims // as an UTF-8 encoded JSON object using the application/json content-type. // Example: none // Enum: ["none","RS256","ES256"] UserinfoSignedResponseAlg string `json:"userinfo_signed_response_alg,omitempty" yaml:"userinfo_signed_response_alg,omitempty"` }
CreateClientAdminRequest create client admin request
swagger:model CreateClientAdminRequest
func (*CreateClientAdminRequest) ContextValidate ¶
func (m *CreateClientAdminRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this create client admin request based on the context it is used
func (*CreateClientAdminRequest) MarshalBinary ¶
func (m *CreateClientAdminRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CreateClientAdminRequest) UnmarshalBinary ¶
func (m *CreateClientAdminRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CreateGatewayRequest ¶
type CreateGatewayRequest struct { // if true a services is created automatically for each new discovered api group CreateAndBindServicesAutomatically bool `json:"create_and_bind_services_automatically,omitempty" yaml:"create_and_bind_services_automatically,omitempty"` // default policy id assigned to new APIs DefaultPolicyID string `json:"default_policy_id,omitempty" yaml:"default_policy_id,omitempty"` // description Description string `json:"description,omitempty" yaml:"description,omitempty"` // gateway name // Example: Cloudentity Pyron Name string `json:"name,omitempty" yaml:"name,omitempty"` // ServerID that this gateway should protect ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // gateway type, one of: pyron, aws, azure, istio, kong, apigeex, apigeeedge, standalone // Example: pyron Type string `json:"type,omitempty" yaml:"type,omitempty"` }
CreateGatewayRequest create gateway request
swagger:model CreateGatewayRequest
func (*CreateGatewayRequest) ContextValidate ¶
ContextValidate validates this create gateway request based on context it is used
func (*CreateGatewayRequest) MarshalBinary ¶
func (m *CreateGatewayRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CreateGatewayRequest) UnmarshalBinary ¶
func (m *CreateGatewayRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CreateOrganizationRequest ¶
type CreateOrganizationRequest struct { // allowed authentication mechanisms AuthenticationMechanisms []string `json:"authentication_mechanisms" yaml:"authentication_mechanisms"` // Your organization's label color in a HEX format. // Example: #007FFF Color string `json:"color,omitempty" yaml:"color,omitempty"` // Display description of the organization // Example: Organization description Description string `json:"description,omitempty" yaml:"description,omitempty"` // An array of email domains configured for an organization for the purposes of IDP discovery Domains []string `json:"domains" yaml:"domains"` // Unique identifier of an organization // // If not provided, a random ID is generated. // Example: default ID string `json:"id,omitempty" yaml:"id,omitempty"` // metadata Metadata *ServerMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // Display name of the organization // Example: default Name string `json:"name,omitempty" yaml:"name,omitempty"` // The id of the parent workspace / organization ParentID string `json:"parent_id,omitempty" yaml:"parent_id,omitempty"` // If true this organization can be used as a template when creating a new ones. Template bool `json:"template,omitempty" yaml:"template,omitempty"` // The id of the organization template that should be used to create the new organization TemplateID string `json:"template_id,omitempty" yaml:"template_id,omitempty"` }
CreateOrganizationRequest create organization request
swagger:model CreateOrganizationRequest
func (*CreateOrganizationRequest) ContextValidate ¶
func (m *CreateOrganizationRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this create organization request based on the context it is used
func (*CreateOrganizationRequest) MarshalBinary ¶
func (m *CreateOrganizationRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CreateOrganizationRequest) UnmarshalBinary ¶
func (m *CreateOrganizationRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CredentialPayload ¶
type CredentialPayload struct { // credential id CredentialID string `json:"credential_id,omitempty" yaml:"credential_id,omitempty"` // credential type // Enum: ["password","webauthn","totp"] CredentialType string `json:"credential_type,omitempty" yaml:"credential_type,omitempty"` // operation type OperationType string `json:"operation_type,omitempty" yaml:"operation_type,omitempty"` // user id UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"` }
CredentialPayload CredentialPayload credential payload
swagger:model CredentialPayload
func (*CredentialPayload) ContextValidate ¶
ContextValidate validates this credential payload based on context it is used
func (*CredentialPayload) MarshalBinary ¶
func (m *CredentialPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CredentialPayload) UnmarshalBinary ¶
func (m *CredentialPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CrossTenantAPIPolicyBinding ¶
type CrossTenantAPIPolicyBinding struct { // api id APIID string `json:"api_id,omitempty" yaml:"api_id,omitempty"` // api tenant id // Example: system APITenantID string `json:"api_tenant_id,omitempty" yaml:"api_tenant_id,omitempty"` // policy id PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"` // policy server id // Example: default PolicyServerID string `json:"policy_server_id,omitempty" yaml:"policy_server_id,omitempty"` // policy tenant id // Example: default PolicyTenantID string `json:"policy_tenant_id,omitempty" yaml:"policy_tenant_id,omitempty"` }
CrossTenantAPIPolicyBinding cross tenant API policy binding
swagger:model CrossTenantAPIPolicyBinding
func (*CrossTenantAPIPolicyBinding) ContextValidate ¶
func (m *CrossTenantAPIPolicyBinding) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this cross tenant API policy binding based on context it is used
func (*CrossTenantAPIPolicyBinding) MarshalBinary ¶
func (m *CrossTenantAPIPolicyBinding) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CrossTenantAPIPolicyBinding) UnmarshalBinary ¶
func (m *CrossTenantAPIPolicyBinding) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Cursor ¶
type Cursor string
Cursor cursor
swagger:model Cursor
func (Cursor) ContextValidate ¶
ContextValidate validates this cursor based on context it is used
type CustomApp ¶
type CustomApp struct { // ClientID used for the CustomApp ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // ID of the CustomApp // Required: true ID string `json:"id" yaml:"id"` // Name of the CustomApp Name string `json:"name,omitempty" yaml:"name,omitempty"` // ID of the server // Required: true ServerID string `json:"server_id" yaml:"server_id"` // ID of the tenant // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // Type of the custom app // Example: post-authn // Enum: ["post-authn"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // url of the CustomApp // Required: true URL string `json:"url" yaml:"url"` }
CustomApp Custom Branding CustomApp
swagger:model CustomApp
func (*CustomApp) ContextValidate ¶
ContextValidate validates this custom app based on context it is used
func (*CustomApp) MarshalBinary ¶
MarshalBinary interface implementation
func (*CustomApp) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type CustomAppResponse ¶
type CustomAppResponse struct { // client Client *ClientAdminResponse `json:"client,omitempty" yaml:"client,omitempty"` // ClientID used for the CustomApp ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // ID of the CustomApp // Required: true ID string `json:"id" yaml:"id"` // Name of the CustomApp Name string `json:"name,omitempty" yaml:"name,omitempty"` // ID of the server // Required: true ServerID string `json:"server_id" yaml:"server_id"` // ID of the tenant // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // Type of the custom app // Example: post-authn // Enum: ["post-authn"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // url of the CustomApp // Required: true URL string `json:"url" yaml:"url"` }
CustomAppResponse CustomApp object on list or get
swagger:model CustomAppResponse
func (*CustomAppResponse) ContextValidate ¶
ContextValidate validate this custom app response based on the context it is used
func (*CustomAppResponse) MarshalBinary ¶
func (m *CustomAppResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CustomAppResponse) UnmarshalBinary ¶
func (m *CustomAppResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CustomAppsResponse ¶
type CustomAppsResponse struct { // list of CustomApps // in:body CustomApps []*CustomApp `json:"custom_apps" yaml:"custom_apps"` // The ETag HTTP header is an identifier for a specific version of a resource // // in:header Etag string `json:"etag,omitempty" yaml:"etag,omitempty"` }
CustomAppsResponse CustomApps
swagger:model CustomAppsResponse
func (*CustomAppsResponse) ContextValidate ¶
ContextValidate validate this custom apps response based on the context it is used
func (*CustomAppsResponse) MarshalBinary ¶
func (m *CustomAppsResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CustomAppsResponse) UnmarshalBinary ¶
func (m *CustomAppsResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CustomCredentials ¶
type CustomCredentials interface{}
CustomCredentials Custom IDP specific credentials
swagger:model CustomCredentials
type CustomIDP ¶
type CustomIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // credentials Credentials CustomCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // settings Settings *CustomSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
CustomIDP custom ID p
swagger:model CustomIDP
func (*CustomIDP) ContextValidate ¶
ContextValidate validate this custom ID p based on the context it is used
func (*CustomIDP) MarshalBinary ¶
MarshalBinary interface implementation
func (*CustomIDP) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type CustomServerConsent ¶
type CustomServerConsent struct { // Deprecetad scope_grant_url. Use server_consent_url instead ScopeGrantURL string `json:"scope_grant_url,omitempty" yaml:"scope_grant_url,omitempty"` // server consent url ServerConsentURL string `json:"server_consent_url,omitempty" yaml:"server_consent_url,omitempty"` }
CustomServerConsent custom server consent
swagger:model CustomServerConsent
func (*CustomServerConsent) ContextValidate ¶
ContextValidate validates this custom server consent based on context it is used
func (*CustomServerConsent) MarshalBinary ¶
func (m *CustomServerConsent) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CustomServerConsent) UnmarshalBinary ¶
func (m *CustomServerConsent) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CustomSettings ¶
type CustomSettings struct { // URL to your custom login page // Example: https://example.com/login LoginURL string `json:"login_url,omitempty" yaml:"login_url,omitempty"` // Type metadata // // There are two type metadatas: `generic` and `cloudentity`. If you choose `cloudentity` and do // not provide authentication context attributes, it defaults to using the attributes from // Cloudentity Cloud Identity Plane (CIP). // // If not provided, the `generic` type is set. Type string `json:"type,omitempty" yaml:"type,omitempty"` }
CustomSettings Custom IDP specific settings
swagger:model CustomSettings
func (*CustomSettings) ContextValidate ¶
ContextValidate validates this custom settings based on context it is used
func (*CustomSettings) MarshalBinary ¶
func (m *CustomSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CustomSettings) UnmarshalBinary ¶
func (m *CustomSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type CustomerConsentsAuditEventPayload ¶
type CustomerConsentsAuditEventPayload struct { // customer id CustomerID string `json:"customer_id,omitempty" yaml:"customer_id,omitempty"` // number of consents revoked NumberRevoked int64 `json:"number_revoked,omitempty" yaml:"number_revoked,omitempty"` }
CustomerConsentsAuditEventPayload customer consents audit event payload
swagger:model CustomerConsentsAuditEventPayload
func (*CustomerConsentsAuditEventPayload) ContextValidate ¶
func (m *CustomerConsentsAuditEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this customer consents audit event payload based on context it is used
func (*CustomerConsentsAuditEventPayload) MarshalBinary ¶
func (m *CustomerConsentsAuditEventPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*CustomerConsentsAuditEventPayload) UnmarshalBinary ¶
func (m *CustomerConsentsAuditEventPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type DCRCreatedEventPayload ¶
type DCRCreatedEventPayload struct { // client details ClientDetails *DCRDetails `json:"client_details,omitempty" yaml:"client_details,omitempty"` // Arculix DBFP `jwt` cookie. Dbfp string `json:"dbfp,omitempty" yaml:"dbfp,omitempty"` // The visitor's latitude obtained from cf-iplatitude cloudflare header Latitude string `json:"latitude,omitempty" yaml:"latitude,omitempty"` // The visitor's longitude obtained from cf-iplongitude cloudflare header Longitude string `json:"longitude,omitempty" yaml:"longitude,omitempty"` // Requester IP address obtained from system network socket information. RemoteAddr string `json:"remote_addr,omitempty" yaml:"remote_addr,omitempty"` // Requester IP address obtained from True-Client-IP header. TrueClientIP string `json:"true_client_ip,omitempty" yaml:"true_client_ip,omitempty"` // A characteristic string that lets servers and network peers identify the application, operating system, vendor, and/or version of the requesting user agent. UserAgent string `json:"user_agent,omitempty" yaml:"user_agent,omitempty"` // Requester IP address obtained from X-Forwarded-For header. XForwardedFor string `json:"x_forwarded_for,omitempty" yaml:"x_forwarded_for,omitempty"` // Requester IP address obtained from X-Real-IP header. XRealIP string `json:"x_real_ip,omitempty" yaml:"x_real_ip,omitempty"` }
DCRCreatedEventPayload d c r created event payload
swagger:model DCRCreatedEventPayload
func (*DCRCreatedEventPayload) ContextValidate ¶
func (m *DCRCreatedEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this d c r created event payload based on the context it is used
func (*DCRCreatedEventPayload) MarshalBinary ¶
func (m *DCRCreatedEventPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*DCRCreatedEventPayload) UnmarshalBinary ¶
func (m *DCRCreatedEventPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type DCRDetails ¶
type DCRDetails struct { // certificate bound access token CertificateBoundAccessToken bool `json:"certificate_bound_access_token,omitempty" yaml:"certificate_bound_access_token,omitempty"` // client id ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // client name ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"` // grant types GrantTypes []string `json:"grant_types" yaml:"grant_types"` // scopes Scopes []string `json:"scopes" yaml:"scopes"` // software statement provided SoftwareStatementProvided bool `json:"software_statement_provided,omitempty" yaml:"software_statement_provided,omitempty"` // token endpoint auth method // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none","unspecified"] TokenEndpointAuthMethod string `json:"token_endpoint_auth_method,omitempty" yaml:"token_endpoint_auth_method,omitempty"` }
DCRDetails d c r details
swagger:model DCRDetails
func (*DCRDetails) ContextValidate ¶
ContextValidate validates this d c r details based on context it is used
func (*DCRDetails) MarshalBinary ¶
func (m *DCRDetails) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*DCRDetails) UnmarshalBinary ¶
func (m *DCRDetails) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type DCRRejectedEventPayload ¶
type DCRRejectedEventPayload struct { // Arculix DBFP `jwt` cookie. Dbfp string `json:"dbfp,omitempty" yaml:"dbfp,omitempty"` // High level error name (request_forbidden, access_denied, invalid_request). Error string `json:"error,omitempty" yaml:"error,omitempty"` // Error root cause (invalid_pkce, invalid_state, user_policy_failed). ErrorCause string `json:"error_cause,omitempty" yaml:"error_cause,omitempty"` // Human readable error description ErrorDescription string `json:"error_description,omitempty" yaml:"error_description,omitempty"` // Error hint ErrorHint string `json:"error_hint,omitempty" yaml:"error_hint,omitempty"` // External error ExternalError bool `json:"external_error,omitempty" yaml:"external_error,omitempty"` // The visitor's latitude obtained from cf-iplatitude cloudflare header Latitude string `json:"latitude,omitempty" yaml:"latitude,omitempty"` // The visitor's longitude obtained from cf-iplongitude cloudflare header Longitude string `json:"longitude,omitempty" yaml:"longitude,omitempty"` // Requester IP address obtained from system network socket information. RemoteAddr string `json:"remote_addr,omitempty" yaml:"remote_addr,omitempty"` // Requester IP address obtained from True-Client-IP header. TrueClientIP string `json:"true_client_ip,omitempty" yaml:"true_client_ip,omitempty"` // A characteristic string that lets servers and network peers identify the application, operating system, vendor, and/or version of the requesting user agent. UserAgent string `json:"user_agent,omitempty" yaml:"user_agent,omitempty"` // Requester IP address obtained from X-Forwarded-For header. XForwardedFor string `json:"x_forwarded_for,omitempty" yaml:"x_forwarded_for,omitempty"` // Requester IP address obtained from X-Real-IP header. XRealIP string `json:"x_real_ip,omitempty" yaml:"x_real_ip,omitempty"` }
DCRRejectedEventPayload d c r rejected event payload
swagger:model DCRRejectedEventPayload
func (*DCRRejectedEventPayload) ContextValidate ¶
func (m *DCRRejectedEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this d c r rejected event payload based on context it is used
func (*DCRRejectedEventPayload) MarshalBinary ¶
func (m *DCRRejectedEventPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*DCRRejectedEventPayload) UnmarshalBinary ¶
func (m *DCRRejectedEventPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type DefaultBruteForceLimit ¶
type DefaultBruteForceLimit struct { // duration until retry permitted in minutes // Format: duration BlockDuration strfmt.Duration `json:"block_duration,omitempty" yaml:"block_duration,omitempty"` // number of attempts before blocked MaxAttempts int64 `json:"max_attempts,omitempty" yaml:"max_attempts,omitempty"` }
DefaultBruteForceLimit default brute force limit
swagger:model DefaultBruteForceLimit
func (*DefaultBruteForceLimit) ContextValidate ¶
func (m *DefaultBruteForceLimit) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this default brute force limit based on context it is used
func (*DefaultBruteForceLimit) MarshalBinary ¶
func (m *DefaultBruteForceLimit) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*DefaultBruteForceLimit) UnmarshalBinary ¶
func (m *DefaultBruteForceLimit) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type DefaultBruteForceLimits ¶
type DefaultBruteForceLimits struct { // client authentication ClientAuthentication *DefaultBruteForceLimit `json:"client_authentication,omitempty" yaml:"client_authentication,omitempty"` // device handling DeviceHandling *DefaultBruteForceLimit `json:"device_handling,omitempty" yaml:"device_handling,omitempty"` // enabled Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"` // identity activate self registered IdentityActivateSelfRegistered *DefaultBruteForceLimit `json:"identity_activate_self_registered,omitempty" yaml:"identity_activate_self_registered,omitempty"` // identity activate with extended code IdentityActivateWithExtendedCode *DefaultBruteForceLimit `json:"identity_activate_with_extended_code,omitempty" yaml:"identity_activate_with_extended_code,omitempty"` // identity address verification IdentityAddressVerification *DefaultBruteForceLimit `json:"identity_address_verification,omitempty" yaml:"identity_address_verification,omitempty"` // identity authentication IdentityAuthentication *DefaultBruteForceLimit `json:"identity_authentication,omitempty" yaml:"identity_authentication,omitempty"` // identity change password IdentityChangePassword *DefaultBruteForceLimit `json:"identity_change_password,omitempty" yaml:"identity_change_password,omitempty"` // identity change totp secret IdentityChangeTotpSecret *DefaultBruteForceLimit `json:"identity_change_totp_secret,omitempty" yaml:"identity_change_totp_secret,omitempty"` // identity code inspect IdentityCodeInspect *DefaultBruteForceLimit `json:"identity_code_inspect,omitempty" yaml:"identity_code_inspect,omitempty"` // identity code verify IdentityCodeVerify *DefaultBruteForceLimit `json:"identity_code_verify,omitempty" yaml:"identity_code_verify,omitempty"` // identity confirm password IdentityConfirmPassword *DefaultBruteForceLimit `json:"identity_confirm_password,omitempty" yaml:"identity_confirm_password,omitempty"` // identity registration IdentityRegistration *DefaultBruteForceLimit `json:"identity_registration,omitempty" yaml:"identity_registration,omitempty"` // identity self activation IdentitySelfActivation *DefaultBruteForceLimit `json:"identity_self_activation,omitempty" yaml:"identity_self_activation,omitempty"` // identity self change password IdentitySelfChangePassword *DefaultBruteForceLimit `json:"identity_self_change_password,omitempty" yaml:"identity_self_change_password,omitempty"` // identity self change totp secret IdentitySelfChangeTotpSecret *DefaultBruteForceLimit `json:"identity_self_change_totp_secret,omitempty" yaml:"identity_self_change_totp_secret,omitempty"` // identity self register IdentitySelfRegister *DefaultBruteForceLimit `json:"identity_self_register,omitempty" yaml:"identity_self_register,omitempty"` // identity set credential IdentitySetCredential *DefaultBruteForceLimit `json:"identity_set_credential,omitempty" yaml:"identity_set_credential,omitempty"` // identity verify password IdentityVerifyPassword *DefaultBruteForceLimit `json:"identity_verify_password,omitempty" yaml:"identity_verify_password,omitempty"` // mfa Mfa *DefaultBruteForceLimit `json:"mfa,omitempty" yaml:"mfa,omitempty"` }
DefaultBruteForceLimits default brute force limits
swagger:model DefaultBruteForceLimits
func (*DefaultBruteForceLimits) ContextValidate ¶
func (m *DefaultBruteForceLimits) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this default brute force limits based on the context it is used
func (*DefaultBruteForceLimits) MarshalBinary ¶
func (m *DefaultBruteForceLimits) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*DefaultBruteForceLimits) UnmarshalBinary ¶
func (m *DefaultBruteForceLimits) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type DefaultEmailSettings ¶
type DefaultEmailSettings struct { // from From string `json:"from,omitempty" yaml:"from,omitempty"` // message subject MessageSubject string `json:"message_subject,omitempty" yaml:"message_subject,omitempty"` // message template MessageTemplate string `json:"message_template,omitempty" yaml:"message_template,omitempty"` }
DefaultEmailSettings default email settings
swagger:model DefaultEmailSettings
func (*DefaultEmailSettings) ContextValidate ¶
ContextValidate validates this default email settings based on context it is used
func (*DefaultEmailSettings) MarshalBinary ¶
func (m *DefaultEmailSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*DefaultEmailSettings) UnmarshalBinary ¶
func (m *DefaultEmailSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type DefaultSMSSettings ¶
type DefaultSMSSettings struct { // message template MessageTemplate string `json:"message_template,omitempty" yaml:"message_template,omitempty"` // source Source string `json:"source,omitempty" yaml:"source,omitempty"` }
DefaultSMSSettings default s m s settings
swagger:model DefaultSMSSettings
func (*DefaultSMSSettings) ContextValidate ¶
ContextValidate validates this default s m s settings based on context it is used
func (*DefaultSMSSettings) MarshalBinary ¶
func (m *DefaultSMSSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*DefaultSMSSettings) UnmarshalBinary ¶
func (m *DefaultSMSSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type DeviceAuthorizationConfiguration ¶
type DeviceAuthorizationConfiguration struct { // Custom device authorization request TTL // If not provided, TTL is set to 30 minutes // Format: duration RequestTTL strfmt.Duration `json:"request_ttl,omitempty" yaml:"request_ttl,omitempty"` // user code character set UserCodeCharacterSet UserCodeCharacterSet `json:"user_code_character_set,omitempty" yaml:"user_code_character_set,omitempty"` // user code length UserCodeLength int64 `json:"user_code_length,omitempty" yaml:"user_code_length,omitempty"` }
DeviceAuthorizationConfiguration device authorization configuration
swagger:model DeviceAuthorizationConfiguration
func (*DeviceAuthorizationConfiguration) ContextValidate ¶
func (m *DeviceAuthorizationConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this device authorization configuration based on the context it is used
func (*DeviceAuthorizationConfiguration) MarshalBinary ¶
func (m *DeviceAuthorizationConfiguration) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*DeviceAuthorizationConfiguration) UnmarshalBinary ¶
func (m *DeviceAuthorizationConfiguration) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Duration ¶
type Duration int64
Duration A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years.
swagger:model Duration
func (Duration) ContextValidate ¶
ContextValidate validates this duration based on context it is used
type DurationType ¶
type DurationType string
DurationType duration type
swagger:model DurationType
func (DurationType) ContextValidate ¶
ContextValidate validates this duration type based on context it is used
type DynamicClientRegistrationSettings ¶
type DynamicClientRegistrationSettings struct { // Binds registration token to the certificate used to register client CertBoundRegistrationToken bool `json:"cert_bound_registration_token,omitempty" yaml:"cert_bound_registration_token,omitempty"` // An optional list of scopes to be granted to a client when no scopes are provided in the DCR registration request // // If not provided, the following default scopes are granted for the client application: openid, address, email, phone, profile. DefaultScopes []string `json:"default_scopes" yaml:"default_scopes"` // Disable registration access token expiry // // If is flag is on, the registration access token will never expire. DisableRegistrationAccessTokenExpiry bool `json:"disable_registration_access_token_expiry,omitempty" yaml:"disable_registration_access_token_expiry,omitempty"` // Disables client management using registration token // // If disabled, client can manage itself using access token issued by client credentials flow. DisableRegistrationTokenManagement bool `json:"disable_registration_token_management,omitempty" yaml:"disable_registration_token_management,omitempty"` // Disables registration token rotation DisableRegistrationTokenRotation bool `json:"disable_registration_token_rotation,omitempty" yaml:"disable_registration_token_rotation,omitempty"` // Enables dynamic client registration Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"` // initial access token InitialAccessToken *InitialAccessTokenSettings `json:"initial_access_token,omitempty" yaml:"initial_access_token,omitempty"` // payload Payload *PayloadSettings `json:"payload,omitempty" yaml:"payload,omitempty"` // Registration access token TTL // // Time to live of the registration access token (default 30 days). // The minimum value is 24 hours. // Example: 720h0m0s // Format: duration RegistrationAccessTokenTTL strfmt.Duration `json:"registration_access_token_ttl,omitempty" yaml:"registration_access_token_ttl,omitempty"` }
DynamicClientRegistrationSettings dynamic client registration settings
swagger:model DynamicClientRegistrationSettings
func (*DynamicClientRegistrationSettings) ContextValidate ¶
func (m *DynamicClientRegistrationSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this dynamic client registration settings based on the context it is used
func (*DynamicClientRegistrationSettings) MarshalBinary ¶
func (m *DynamicClientRegistrationSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*DynamicClientRegistrationSettings) UnmarshalBinary ¶
func (m *DynamicClientRegistrationSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Element ¶
type Element struct { // attr Attr []*Attr `json:"Attr" yaml:"Attr"` // child Child []*Token `json:"Child" yaml:"Child"` // space Space string `json:"Space,omitempty" yaml:"Space,omitempty"` }
Element An Element represents an XML element, its attributes, and its child tokens.
swagger:model Element
func (*Element) ContextValidate ¶
ContextValidate validate this element based on the context it is used
func (*Element) MarshalBinary ¶
MarshalBinary interface implementation
func (*Element) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type EmailAuth ¶
type EmailAuth struct { // SMTP auth mechanism: crammd5 or plain // Example: plain // Required: true Auth string `json:"auth" yaml:"auth"` // The host of the SMTP server. // Required: true Host string `json:"host" yaml:"host"` // Password which is used to authenticate to the SMTP server. // Required: true Password string `json:"password" yaml:"password"` // The port of the SMTP server. // Example: 25 // Required: true Port int64 `json:"port" yaml:"port"` // Username which is used to authenticate to the SMTP server. // Required: true Username string `json:"username" yaml:"username"` }
EmailAuth email auth
swagger:model EmailAuth
func (*EmailAuth) ContextValidate ¶
ContextValidate validates this email auth based on context it is used
func (*EmailAuth) MarshalBinary ¶
MarshalBinary interface implementation
func (*EmailAuth) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type EmailSettings ¶
type EmailSettings struct { // Custom email From address. // // If not set, the default is used. // Example: noreply@cloudentity.com CustomFrom string `json:"custom_from,omitempty" yaml:"custom_from,omitempty"` // Custom email subject. // // If not set, the default is used. CustomMessageSubject string `json:"custom_message_subject,omitempty" yaml:"custom_message_subject,omitempty"` // Custom email template. // // If not set, the default is used. CustomMessageTemplate string `json:"custom_message_template,omitempty" yaml:"custom_message_template,omitempty"` // otp Otp *OTPConfiguration `json:"otp,omitempty" yaml:"otp,omitempty"` // Email provider. // Example: embedded // Enum: ["smtp","embedded"] Provider string `json:"provider,omitempty" yaml:"provider,omitempty"` }
EmailSettings email settings
swagger:model EmailSettings
func (*EmailSettings) ContextValidate ¶
ContextValidate validate this email settings based on the context it is used
func (*EmailSettings) MarshalBinary ¶
func (m *EmailSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*EmailSettings) UnmarshalBinary ¶
func (m *EmailSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type EncryptionMethod ¶
type EncryptionMethod struct { // algorithm Algorithm string `json:"Algorithm,omitempty" yaml:"Algorithm,omitempty"` }
EncryptionMethod EncryptionMethod represents the XMLSEC object of the same name
swagger:model EncryptionMethod
func (*EncryptionMethod) ContextValidate ¶
ContextValidate validates this encryption method based on context it is used
func (*EncryptionMethod) MarshalBinary ¶
func (m *EncryptionMethod) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*EncryptionMethod) UnmarshalBinary ¶
func (m *EncryptionMethod) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Endpoint ¶
type Endpoint struct { // binding Binding string `json:"Binding,omitempty" yaml:"Binding,omitempty"` // location Location string `json:"Location,omitempty" yaml:"Location,omitempty"` // response location ResponseLocation string `json:"ResponseLocation,omitempty" yaml:"ResponseLocation,omitempty"` }
Endpoint Endpoint represents the SAML EndpointType object.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.2.2
swagger:model Endpoint
func (*Endpoint) ContextValidate ¶
ContextValidate validates this endpoint based on context it is used
func (*Endpoint) MarshalBinary ¶
MarshalBinary interface implementation
func (*Endpoint) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type EntityDescriptor ¶
type EntityDescriptor struct { // additional metadata locations AdditionalMetadataLocations []string `json:"AdditionalMetadataLocations" yaml:"AdditionalMetadataLocations"` // affiliation descriptor AffiliationDescriptor *AffiliationDescriptor `json:"AffiliationDescriptor,omitempty" yaml:"AffiliationDescriptor,omitempty"` // attribute authority descriptors AttributeAuthorityDescriptors []*AttributeAuthorityDescriptor `json:"AttributeAuthorityDescriptors" yaml:"AttributeAuthorityDescriptors"` // authn authority descriptors AuthnAuthorityDescriptors []*AuthnAuthorityDescriptor `json:"AuthnAuthorityDescriptors" yaml:"AuthnAuthorityDescriptors"` // cache duration CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"` // contact person ContactPerson *ContactPerson `json:"ContactPerson,omitempty" yaml:"ContactPerson,omitempty"` // entity ID EntityID string `json:"EntityID,omitempty" yaml:"EntityID,omitempty"` // ID ID string `json:"ID,omitempty" yaml:"ID,omitempty"` // ID p s s o descriptors IDPSSODescriptors []*IDPSSODescriptor `json:"IDPSSODescriptors" yaml:"IDPSSODescriptors"` // organization Organization *Organization `json:"Organization,omitempty" yaml:"Organization,omitempty"` // p d p descriptors PDPDescriptors []*PDPDescriptor `json:"PDPDescriptors" yaml:"PDPDescriptors"` // role descriptors RoleDescriptors []*RoleDescriptor `json:"RoleDescriptors" yaml:"RoleDescriptors"` // s p s s o descriptors SPSSODescriptors []*SPSSODescriptor `json:"SPSSODescriptors" yaml:"SPSSODescriptors"` // signature Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"` // valid until // Format: date-time ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"` // XML name XMLName *Name `json:"XMLName,omitempty" yaml:"XMLName,omitempty"` }
EntityDescriptor EntityDescriptor represents the SAML EntityDescriptor object.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.3.2
swagger:model EntityDescriptor
func (*EntityDescriptor) ContextValidate ¶
ContextValidate validate this entity descriptor based on the context it is used
func (*EntityDescriptor) MarshalBinary ¶
func (m *EntityDescriptor) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*EntityDescriptor) UnmarshalBinary ¶
func (m *EntityDescriptor) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Environment ¶
type Environment struct { // ACR support Acr bool `json:"acr,omitempty" yaml:"acr,omitempty"` // add fake tenantUrl to query params for routing other than default (needed for backward compatibility with CIP for vanity domains) AddFakeTenantURLToLoginRequestForNonDefaultRouting bool `` /* 155-byte string literal not displayed */ // admin issuer url AdminIssuerURL string `json:"admin_issuer_url,omitempty" yaml:"admin_issuer_url,omitempty"` // admin workspace access AdminWorkspaceAccess bool `json:"admin_workspace_access,omitempty" yaml:"admin_workspace_access,omitempty"` // allow Identity Pool OTP Challenge confirmation via web page AllowIdentityPoolOtpChallengeConfirmationViaWebPage bool `` /* 153-byte string literal not displayed */ // analytics duration // Format: duration AnalyticsDuration strfmt.Duration `json:"analytics_duration,omitempty" yaml:"analytics_duration,omitempty"` // audit events duration // Format: duration AuditEventsDuration strfmt.Duration `json:"audit_events_duration,omitempty" yaml:"audit_events_duration,omitempty"` // block access to a tenant's resources from traffic not originating from the tenant's vanity domain BlockNonVanityDomainAccess bool `json:"block_non_vanity_domain_access,omitempty" yaml:"block_non_vanity_domain_access,omitempty"` // brute force limits BruteForceLimits *DefaultBruteForceLimits `json:"brute_force_limits,omitempty" yaml:"brute_force_limits,omitempty"` // cache access tokens CacheAccessTokens bool `json:"cache_access_tokens,omitempty" yaml:"cache_access_tokens,omitempty"` // arrangement cache for CDR CdrArrangementCache bool `json:"cdr_arrangement_cache,omitempty" yaml:"cdr_arrangement_cache,omitempty"` // disable unique software id for CDR CdrDisableUniqueSoftwareID bool `json:"cdr_disable_unique_software_id,omitempty" yaml:"cdr_disable_unique_software_id,omitempty"` // stores client secrets as one-way hashes ClientSecretsStoredAsOneWayHash bool `json:"client_secrets_stored_as_one_way_hash,omitempty" yaml:"client_secrets_stored_as_one_way_hash,omitempty"` // Cloudentity IDP CloudentityIdp bool `json:"cloudentity_idp,omitempty" yaml:"cloudentity_idp,omitempty"` // commit Commit string `json:"commit,omitempty" yaml:"commit,omitempty"` // connectID profile ConnectID bool `json:"connect_id,omitempty" yaml:"connect_id,omitempty"` // connect ID consent page facelifting ConnectIDConsentPageFaceLifting bool `json:"connect_id_consent_page_face_lifting,omitempty" yaml:"connect_id_consent_page_face_lifting,omitempty"` // enable additional debug logs Debug bool `json:"debug,omitempty" yaml:"debug,omitempty"` // allow the usage of dedicated FaaS Rego/JS environments DedicatedFaas bool `json:"dedicated_faas,omitempty" yaml:"dedicated_faas,omitempty"` // demo app DemoApp bool `json:"demo_app,omitempty" yaml:"demo_app,omitempty"` // hot reloading of templates DevMode bool `json:"dev_mode,omitempty" yaml:"dev_mode,omitempty"` // disable audit events DisableAuditEvents bool `json:"disable_audit_events,omitempty" yaml:"disable_audit_events,omitempty"` // disable embedded sms provider DisableEmbeddedSmsProvider bool `json:"disable_embedded_sms_provider,omitempty" yaml:"disable_embedded_sms_provider,omitempty"` // display workspace wizard DisplayWorkspaceWizard bool `json:"display_workspace_wizard,omitempty" yaml:"display_workspace_wizard,omitempty"` // do not validate cert for private key jwt DoNotValidateCertForPrivateKeyJwt bool `json:"do_not_validate_cert_for_private_key_jwt,omitempty" yaml:"do_not_validate_cert_for_private_key_jwt,omitempty"` // drop tokens on password reset DropTokensOnPasswordReset bool `json:"drop_tokens_on_password_reset,omitempty" yaml:"drop_tokens_on_password_reset,omitempty"` // use fake data (such as ips) - needed for qa testing FakeData bool `json:"fake_data,omitempty" yaml:"fake_data,omitempty"` // grpc url GrpcURL string `json:"grpc_url,omitempty" yaml:"grpc_url,omitempty"` // Handle MFA Recovery in Identity Pools HandleMfaRecoveryInIdentityPools bool `json:"handle_mfa_recovery_in_identity_pools,omitempty" yaml:"handle_mfa_recovery_in_identity_pools,omitempty"` // has google image search HasGoogleImageSearch bool `json:"has_google_image_search,omitempty" yaml:"has_google_image_search,omitempty"` // identity assurance IdentityAssurance bool `json:"identity_assurance,omitempty" yaml:"identity_assurance,omitempty"` // image proxy url ImageProxyURL string `json:"image_proxy_url,omitempty" yaml:"image_proxy_url,omitempty"` // when enabled and the display_workspace_wizard feature flag is set to true, a demo workspace with a set of preconfigured IDPs is created and no welcome screen is displayed InitializeDemoWorkspace bool `json:"initialize_demo_workspace,omitempty" yaml:"initialize_demo_workspace,omitempty"` // disable csrf InsecureDisableCsrf bool `json:"insecure_disable_csrf,omitempty" yaml:"insecure_disable_csrf,omitempty"` // insecure token exchange public clients InsecureTokenExchangePublicClients bool `json:"insecure_token_exchange_public_clients,omitempty" yaml:"insecure_token_exchange_public_clients,omitempty"` // mark address as verified on any proof of possession of the address MarkAddressAsVerifiedOnAnyProofOfPossession bool `` /* 137-byte string literal not displayed */ // new onboarding flow NewOnboarding bool `json:"new_onboarding,omitempty" yaml:"new_onboarding,omitempty"` // openbanking brasil Obbr bool `json:"obbr,omitempty" yaml:"obbr,omitempty"` // openbanking ksa workspace and security profile OpenbankingKsa bool `json:"openbanking_ksa,omitempty" yaml:"openbanking_ksa,omitempty"` // Organizations // // Delineate a structured and hierarchical separation among your business customers' companies or partners. Enable Delegated Admin Portal. Organizations bool `json:"organizations,omitempty" yaml:"organizations,omitempty"` // rich authorization requests Rar bool `json:"rar,omitempty" yaml:"rar,omitempty"` // Risk engine RiskEngine bool `json:"risk_engine,omitempty" yaml:"risk_engine,omitempty"` // scope transient_otp ScopeTransientOtp bool `json:"scope_transient_otp,omitempty" yaml:"scope_transient_otp,omitempty"` // script runtimes ScriptRuntimes []*ScriptRuntime `json:"script_runtimes" yaml:"script_runtimes"` // Self-service // // Enable users to manage their accounts using the self-service view. Allow users to adjust their profile, see their sign-in methods, authorized applications, and more. SelfService bool `json:"self_service,omitempty" yaml:"self_service,omitempty"` // swagger ui SwaggerUI bool `json:"swagger_ui,omitempty" yaml:"swagger_ui,omitempty"` // system flags SystemFlags []string `json:"system_flags" yaml:"system_flags"` // system workspace access SystemWorkspaceAccess bool `json:"system_workspace_access,omitempty" yaml:"system_workspace_access,omitempty"` // tenant flags TenantFlags []string `json:"tenant_flags" yaml:"tenant_flags"` // tenant settings TenantSettings *TenantSettings `json:"tenant_settings,omitempty" yaml:"tenant_settings,omitempty"` // hierarchical dumps tenant APIs TreeDumpTenant bool `json:"tree_dump_tenant,omitempty" yaml:"tree_dump_tenant,omitempty"` // version Version string `json:"version,omitempty" yaml:"version,omitempty"` // with analytics WithAnalytics bool `json:"with_analytics,omitempty" yaml:"with_analytics,omitempty"` // with permissions WithPermissions bool `json:"with_permissions,omitempty" yaml:"with_permissions,omitempty"` // with roles WithRoles bool `json:"with_roles,omitempty" yaml:"with_roles,omitempty"` }
Environment environment
swagger:model Environment
func (*Environment) ContextValidate ¶
ContextValidate validate this environment based on the context it is used
func (*Environment) MarshalBinary ¶
func (m *Environment) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*Environment) UnmarshalBinary ¶
func (m *Environment) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Error ¶
type Error struct { // details Details interface{} `json:"details,omitempty" yaml:"details,omitempty"` // error Error string `json:"error,omitempty" yaml:"error,omitempty"` // error code ErrorCode string `json:"error_code,omitempty" yaml:"error_code,omitempty"` // status code StatusCode int64 `json:"status_code,omitempty" yaml:"status_code,omitempty"` }
Error HTTP error response
swagger:model Error
func (*Error) ContextValidate ¶
ContextValidate validates this error based on context it is used
func (*Error) MarshalBinary ¶
MarshalBinary interface implementation
func (*Error) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type Event ¶
type Event struct { // description Description string `json:"description,omitempty" yaml:"description,omitempty"` // name Name string `json:"name,omitempty" yaml:"name,omitempty"` }
Event event
swagger:model Event
func (*Event) ContextValidate ¶
ContextValidate validates this event based on context it is used
func (*Event) MarshalBinary ¶
MarshalBinary interface implementation
func (*Event) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type EventAddress ¶
type EventAddress struct { // value Value string `json:"value,omitempty" yaml:"value,omitempty"` }
EventAddress EventAddress event address
swagger:model EventAddress
func (*EventAddress) ContextValidate ¶
ContextValidate validates this event address based on context it is used
func (*EventAddress) MarshalBinary ¶
func (m *EventAddress) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*EventAddress) UnmarshalBinary ¶
func (m *EventAddress) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type EventIdentifier ¶
type EventIdentifier struct { // value Value string `json:"value,omitempty" yaml:"value,omitempty"` }
EventIdentifier EventIdentifier event identifier
swagger:model EventIdentifier
func (*EventIdentifier) ContextValidate ¶
ContextValidate validates this event identifier based on context it is used
func (*EventIdentifier) MarshalBinary ¶
func (m *EventIdentifier) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*EventIdentifier) UnmarshalBinary ¶
func (m *EventIdentifier) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type EventSubject ¶
type EventSubject struct { // description Description string `json:"description,omitempty" yaml:"description,omitempty"` // events Events []*Event `json:"events" yaml:"events"` // name Name string `json:"name,omitempty" yaml:"name,omitempty"` }
EventSubject event subject
swagger:model EventSubject
func (*EventSubject) ContextValidate ¶
ContextValidate validate this event subject based on the context it is used
func (*EventSubject) MarshalBinary ¶
func (m *EventSubject) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*EventSubject) UnmarshalBinary ¶
func (m *EventSubject) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ExtendedRoleResource ¶
type ExtendedRoleResource struct { // identity pool id IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // role // Enum: ["admin","business_admin","auditor","manager","user_manager","member"] Role string `json:"role,omitempty" yaml:"role,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type // Enum: ["tenant","workspace","identity_pool"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // workspace id WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
ExtendedRoleResource extended role resource
swagger:model ExtendedRoleResource
func (*ExtendedRoleResource) ContextValidate ¶
ContextValidate validates this extended role resource based on context it is used
func (*ExtendedRoleResource) MarshalBinary ¶
func (m *ExtendedRoleResource) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ExtendedRoleResource) UnmarshalBinary ¶
func (m *ExtendedRoleResource) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ExternalCIBAAuthenticationService ¶
type ExternalCIBAAuthenticationService struct { // credentials Credentials *ExternalServiceCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // url to the ciba authenticator service URL string `json:"url,omitempty" yaml:"url,omitempty"` }
ExternalCIBAAuthenticationService external c i b a authentication service
swagger:model ExternalCIBAAuthenticationService
func (*ExternalCIBAAuthenticationService) ContextValidate ¶
func (m *ExternalCIBAAuthenticationService) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this external c i b a authentication service based on the context it is used
func (*ExternalCIBAAuthenticationService) MarshalBinary ¶
func (m *ExternalCIBAAuthenticationService) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ExternalCIBAAuthenticationService) UnmarshalBinary ¶
func (m *ExternalCIBAAuthenticationService) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ExternalCredentials ¶
type ExternalCredentials struct { // query or header APIKeyIn string `json:"api_key_in,omitempty" yaml:"api_key_in,omitempty"` // api key name APIKeyName string `json:"api_key_name,omitempty" yaml:"api_key_name,omitempty"` // api key value APIKeyValue string `json:"api_key_value,omitempty" yaml:"api_key_value,omitempty"` // http basic auth password Password string `json:"password,omitempty" yaml:"password,omitempty"` // http basic auth username Username string `json:"username,omitempty" yaml:"username,omitempty"` }
ExternalCredentials External IDP specific credentials
swagger:model ExternalCredentials
func (*ExternalCredentials) ContextValidate ¶
ContextValidate validates this external credentials based on context it is used
func (*ExternalCredentials) MarshalBinary ¶
func (m *ExternalCredentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ExternalCredentials) UnmarshalBinary ¶
func (m *ExternalCredentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ExternalIDP ¶
type ExternalIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // credentials Credentials *ExternalCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // settings Settings *ExternalSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
ExternalIDP external ID p
swagger:model ExternalIDP
func (*ExternalIDP) ContextValidate ¶
ContextValidate validate this external ID p based on the context it is used
func (*ExternalIDP) MarshalBinary ¶
func (m *ExternalIDP) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ExternalIDP) UnmarshalBinary ¶
func (m *ExternalIDP) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ExternalServiceCredentials ¶
type ExternalServiceCredentials struct { // query or header APIKeyIn string `json:"api_key_in,omitempty" yaml:"api_key_in,omitempty"` // api key name APIKeyName string `json:"api_key_name,omitempty" yaml:"api_key_name,omitempty"` // api key value APIKeyValue string `json:"api_key_value,omitempty" yaml:"api_key_value,omitempty"` // http basic auth password Password string `json:"password,omitempty" yaml:"password,omitempty"` // http basic auth username Username string `json:"username,omitempty" yaml:"username,omitempty"` }
ExternalServiceCredentials external service credentials
swagger:model ExternalServiceCredentials
func (*ExternalServiceCredentials) ContextValidate ¶
func (m *ExternalServiceCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this external service credentials based on context it is used
func (*ExternalServiceCredentials) MarshalBinary ¶
func (m *ExternalServiceCredentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ExternalServiceCredentials) UnmarshalBinary ¶
func (m *ExternalServiceCredentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ExternalSettings ¶
type ExternalSettings struct { // URL to your external datastore service // Example: https://example.com/ URL string `json:"url,omitempty" yaml:"url,omitempty"` }
ExternalSettings External IDP specific settings
swagger:model ExternalSettings
func (*ExternalSettings) ContextValidate ¶
ContextValidate validates this external settings based on context it is used
func (*ExternalSettings) MarshalBinary ¶
func (m *ExternalSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ExternalSettings) UnmarshalBinary ¶
func (m *ExternalSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type FDXClientStatus ¶
type FDXClientStatus string
FDXClientStatus f d x client status
swagger:model FDXClientStatus
func (FDXClientStatus) ContextValidate ¶
ContextValidate validates this f d x client status based on context it is used
type FDXConfiguration ¶
type FDXConfiguration struct { // initial client status InitialClientStatus FDXClientStatus `json:"initial_client_status,omitempty" yaml:"initial_client_status,omitempty"` // legal entity LegalEntity *LegalEntity `json:"legal_entity,omitempty" yaml:"legal_entity,omitempty"` }
FDXConfiguration f d x configuration
swagger:model FDXConfiguration
func (*FDXConfiguration) ContextValidate ¶
ContextValidate validate this f d x configuration based on the context it is used
func (*FDXConfiguration) MarshalBinary ¶
func (m *FDXConfiguration) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*FDXConfiguration) UnmarshalBinary ¶
func (m *FDXConfiguration) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type FDXConsent ¶
type FDXConsent struct { // authorization server id AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // client id ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // Time of consent creation // Format: date-time CreatedTime strfmt.DateTime `json:"createdTime,omitempty" yaml:"createdTime,omitempty"` // Consent duration, in days, from day of original grant. DurationPeriod int64 `json:"durationPeriod,omitempty" yaml:"durationPeriod,omitempty"` // duration type DurationType DurationType `json:"durationType,omitempty" yaml:"durationType,omitempty"` // Time of consent expiration // Format: date-time ExpirationTime strfmt.DateTime `json:"expirationTime,omitempty" yaml:"expirationTime,omitempty"` // Enumeration of the Clusters of granted data elements permissioned by this Consent Grant. // Data Clusters are described in FDX RFC 0167. GrantedResources []*FDXGrantedResource `json:"granted_resources" yaml:"granted_resources"` // id ID FDXConsentID `json:"id,omitempty" yaml:"id,omitempty"` // Period, in days, for which historical data may be requested; period is measured from request time, not grant time LookbackPeriod int64 `json:"lookbackPeriod,omitempty" yaml:"lookbackPeriod,omitempty"` // A collection of parameters identifying the Parties (including the legal entity operating branded products or services) // in the data sharing chain. Descriptive information is collected during Data Recipient registration at Data Provider, // and populated during issuance by DataProvider from its registry; Parties []*FDXConsentGrantParty `json:"parties" yaml:"parties"` // Enumeration of the Clusters of requested data elements permissioned by this Consent Grant. // Data Clusters are described in FDX RFC 0167. Resources []*FDXRequestedResource `json:"resources" yaml:"resources"` // revocation reason RevocationReason *FDXConsentRevocation `json:"revocationReason,omitempty" yaml:"revocationReason,omitempty"` // status Status ConsentStatus `json:"status,omitempty" yaml:"status,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // Time of last consent's status change // Format: date-time UpdatedTime strfmt.DateTime `json:"updatedTime,omitempty" yaml:"updatedTime,omitempty"` }
FDXConsent f d x consent
swagger:model FDXConsent
func (*FDXConsent) ContextValidate ¶
ContextValidate validate this f d x consent based on the context it is used
func (*FDXConsent) MarshalBinary ¶
func (m *FDXConsent) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*FDXConsent) UnmarshalBinary ¶
func (m *FDXConsent) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type FDXConsentGrantParty ¶
type FDXConsentGrantParty struct { // URL for party, where an end user could learn more about the company or application involved in the data sharing chain HomeURI string `json:"homeUri,omitempty" yaml:"homeUri,omitempty"` // URL for a logo asset to be displayed to the end user LogoURI string `json:"logoUri,omitempty" yaml:"logoUri,omitempty"` // Common name for party, as it should be displayed to the end user Name string `json:"name,omitempty" yaml:"name,omitempty"` // Registered id of party RegisteredEntityIdentifier string `json:"registeredEntityIdentifier,omitempty" yaml:"registeredEntityIdentifier,omitempty"` // Registered name of party RegisteredEntityName string `json:"registeredEntityName,omitempty" yaml:"registeredEntityName,omitempty"` // The registry with the party's registered name and id RegistryName string `json:"registryName,omitempty" yaml:"registryName,omitempty"` }
FDXConsentGrantParty Consent Party entity Details on the non-end user parties in the Consent Grant. Includes the legal entity operating branded products or services in the data sharing chain. Descriptive information is collected during Data Recipient registration at Data Provider, and populated during issuance by Data Provider from its registry
swagger:model FDXConsentGrantParty
func (*FDXConsentGrantParty) ContextValidate ¶
ContextValidate validates this f d x consent grant party based on context it is used
func (*FDXConsentGrantParty) MarshalBinary ¶
func (m *FDXConsentGrantParty) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*FDXConsentGrantParty) UnmarshalBinary ¶
func (m *FDXConsentGrantParty) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type FDXConsentID ¶
type FDXConsentID string
FDXConsentID f d x consent ID
swagger:model FDXConsentID
func (FDXConsentID) ContextValidate ¶
ContextValidate validates this f d x consent ID based on context it is used
type FDXConsentRevocation ¶
type FDXConsentRevocation struct { // Revocation initiator // Example: \"INDIVIDUAL\ // Enum: ["DATA_ACCESS_PLATFORM","DATA_PROVIDER","DATA_RECIPIENT","INDIVIDUAL","MERCHANT","VENDOR"] Initiator string `json:"initiator,omitempty" yaml:"initiator,omitempty"` // Revocation reason // Example: \"USER_ACTION\ // Enum: ["BUSINESS_RULE","USER_ACTION"] Reason string `json:"reason,omitempty" yaml:"reason,omitempty"` }
FDXConsentRevocation Revocation data
swagger:model FDXConsentRevocation
func (*FDXConsentRevocation) ContextValidate ¶
ContextValidate validates this f d x consent revocation based on context it is used
func (*FDXConsentRevocation) MarshalBinary ¶
func (m *FDXConsentRevocation) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*FDXConsentRevocation) UnmarshalBinary ¶
func (m *FDXConsentRevocation) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type FDXGrantedResource ¶
type FDXGrantedResource struct { // The names of clusters with data elements permitted. // Example: ["ACCOUNT_DETAILED","TRANSACTIONS","STATEMENTS"] DataClusters []string `json:"dataClusters" yaml:"dataClusters"` // resource ID // Example: b14e1e714693bc00 ID string `json:"id,omitempty" yaml:"id,omitempty"` // A type of resource that holds the permitted data elements. This parameter can be extended to support additional resource types. // Example: ACCOUNT ResourceType string `json:"resourceType,omitempty" yaml:"resourceType,omitempty"` }
FDXGrantedResource f d x granted resource
swagger:model FDXGrantedResource
func (*FDXGrantedResource) ContextValidate ¶
ContextValidate validates this f d x granted resource based on context it is used
func (*FDXGrantedResource) MarshalBinary ¶
func (m *FDXGrantedResource) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*FDXGrantedResource) UnmarshalBinary ¶
func (m *FDXGrantedResource) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type FDXMetadata ¶
type FDXMetadata struct { // Contact information of individuals responsible for the Data Recipient application. Contacts []string `json:"contacts" yaml:"contacts"` // The time window the end-user grants the consent for. Used when `duration_type`=`TIME_BOUND`. DurationPeriod int64 `json:"duration_period,omitempty" yaml:"duration_period,omitempty"` // The rule of consent granting by the end-user to indicate whether they must take action // to revoke access or the consent will be revoked automatically. // // One of: `ONE_TIME`, `PERSISTENT`, `TIME_BOUND` // Example: ONE_TIME DurationType []DurationType `json:"duration_type" yaml:"duration_type"` // An array of the intermediaries for this Data Recipient. Intermediaries []*Intermediary `json:"intermediaries" yaml:"intermediaries"` // The maximum number of days allowed for Data Recipient consumers to obtain in transaction history, effective from // the current date LookbackPeriod int64 `json:"lookback_period,omitempty" yaml:"lookback_period,omitempty"` // The list of external registries where the Data Recipient is registered. It comprises the following details: // name, identifier, and the `registry` string with any additional info. RegistryReferences []*RegistryReference `json:"registry_references" yaml:"registry_references"` // status Status FDXClientStatus `json:"status,omitempty" yaml:"status,omitempty"` }
FDXMetadata f d x metadata
swagger:model FDXMetadata
func (*FDXMetadata) ContextValidate ¶
ContextValidate validate this f d x metadata based on the context it is used
func (*FDXMetadata) MarshalBinary ¶
func (m *FDXMetadata) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*FDXMetadata) UnmarshalBinary ¶
func (m *FDXMetadata) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type FDXParty ¶
type FDXParty struct { // home uri HomeURI string `json:"home_uri,omitempty" yaml:"home_uri,omitempty"` // logo uri LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // name Name string `json:"name,omitempty" yaml:"name,omitempty"` // registered entity identifier RegisteredEntityIdentifier string `json:"registered_entity_identifier,omitempty" yaml:"registered_entity_identifier,omitempty"` // registered entity name RegisteredEntityName string `json:"registered_entity_name,omitempty" yaml:"registered_entity_name,omitempty"` // registry name RegistryName string `json:"registry_name,omitempty" yaml:"registry_name,omitempty"` }
FDXParty f d x party
swagger:model FDXParty
func (*FDXParty) ContextValidate ¶
ContextValidate validates this f d x party based on context it is used
func (*FDXParty) MarshalBinary ¶
MarshalBinary interface implementation
func (*FDXParty) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type FDXRequestedResource ¶
type FDXRequestedResource struct { // The names of clusters with data elements permitted. // Example: ["ACCOUNT_DETAILED","TRANSACTIONS","STATEMENTS"] DataClusters []string `json:"dataClusters" yaml:"dataClusters"` // A type of resource that holds the permitted data elements. This parameter can be extended to support additional resource types. // Example: ACCOUNT ResourceType string `json:"resourceType,omitempty" yaml:"resourceType,omitempty"` }
FDXRequestedResource f d x requested resource
swagger:model FDXRequestedResource
func (*FDXRequestedResource) ContextValidate ¶
ContextValidate validates this f d x requested resource based on context it is used
func (*FDXRequestedResource) MarshalBinary ¶
func (m *FDXRequestedResource) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*FDXRequestedResource) UnmarshalBinary ¶
func (m *FDXRequestedResource) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type FeatureResponse ¶
type FeatureResponse struct { // description Description string `json:"description,omitempty" yaml:"description,omitempty"` // display name DisplayName string `json:"display_name,omitempty" yaml:"display_name,omitempty"` // enabled Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"` // name Name string `json:"name,omitempty" yaml:"name,omitempty"` }
FeatureResponse feature response
swagger:model FeatureResponse
func (*FeatureResponse) ContextValidate ¶
ContextValidate validates this feature response based on context it is used
func (*FeatureResponse) MarshalBinary ¶
func (m *FeatureResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*FeatureResponse) UnmarshalBinary ¶
func (m *FeatureResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type FeaturesResponse ¶
type FeaturesResponse struct { // features Features []*FeatureResponse `json:"features" yaml:"features"` }
FeaturesResponse features response
swagger:model FeaturesResponse
func (*FeaturesResponse) ContextValidate ¶
ContextValidate validate this features response based on the context it is used
func (*FeaturesResponse) MarshalBinary ¶
func (m *FeaturesResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*FeaturesResponse) UnmarshalBinary ¶
func (m *FeaturesResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type FnEnvVersion ¶
type FnEnvVersion string
FnEnvVersion fn env version
swagger:model FnEnvVersion
func (FnEnvVersion) ContextValidate ¶
ContextValidate validates this fn env version based on context it is used
type Gateway ¶
type Gateway struct { // authorization server id // Example: default AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // id of a client created for this gateway for authentication ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // if true services are created automatically for each new discovered api group CreateAndBindServicesAutomatically bool `json:"create_and_bind_services_automatically,omitempty" yaml:"create_and_bind_services_automatically,omitempty"` // default policy id assigned to new APIs DefaultPolicyID string `json:"default_policy_id,omitempty" yaml:"default_policy_id,omitempty"` // description Description string `json:"description,omitempty" yaml:"description,omitempty"` // unique gateway id // Example: 1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // last time a client fetched configuration // Format: date-time LastActive strfmt.DateTime `json:"last_active,omitempty" yaml:"last_active,omitempty"` // gateway name // Example: Cloudentity Pyron Name string `json:"name,omitempty" yaml:"name,omitempty"` // tenant id // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange TokenExchange *GatewayTokenExchangeSettings `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"` // Token exchange client id TokenExchangeClientID string `json:"token_exchange_client_id,omitempty" yaml:"token_exchange_client_id,omitempty"` // gateway type, one of: pyron, aws // Example: pyron Type string `json:"type,omitempty" yaml:"type,omitempty"` }
Gateway gateway
swagger:model Gateway
func (*Gateway) ContextValidate ¶
ContextValidate validate this gateway based on the context it is used
func (*Gateway) MarshalBinary ¶
MarshalBinary interface implementation
func (*Gateway) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type GatewayAPI ¶
type GatewayAPI struct { // api type // Enum: ["rest","graphql"] APIType string `json:"api_type,omitempty" yaml:"api_type,omitempty"` // graphql schema GraphqlSchema string `json:"graphql_schema,omitempty" yaml:"graphql_schema,omitempty"` // method Method string `json:"method,omitempty" yaml:"method,omitempty"` // path Path string `json:"path,omitempty" yaml:"path,omitempty"` }
GatewayAPI gateway API
swagger:model GatewayAPI
func (*GatewayAPI) ContextValidate ¶
ContextValidate validates this gateway API based on context it is used
func (*GatewayAPI) MarshalBinary ¶
func (m *GatewayAPI) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GatewayAPI) UnmarshalBinary ¶
func (m *GatewayAPI) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GatewayAPIGroup ¶
type GatewayAPIGroup struct { // List of APIs Apis []*GatewayAPI `json:"apis" yaml:"apis"` // gateway id GatewayID string `json:"gateway_id,omitempty" yaml:"gateway_id,omitempty"` // API group ID ID string `json:"id,omitempty" yaml:"id,omitempty"` // metadata Metadata *APIGroupMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // API group name Name string `json:"name,omitempty" yaml:"name,omitempty"` // server id ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // service id ServiceID string `json:"service_id,omitempty" yaml:"service_id,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` }
GatewayAPIGroup gateway API group
swagger:model GatewayAPIGroup
func (*GatewayAPIGroup) ContextValidate ¶
ContextValidate validate this gateway API group based on the context it is used
func (*GatewayAPIGroup) MarshalBinary ¶
func (m *GatewayAPIGroup) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GatewayAPIGroup) UnmarshalBinary ¶
func (m *GatewayAPIGroup) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GatewayAPIGroups ¶
type GatewayAPIGroups struct { // groups Groups []*GatewayAPIGroup `json:"groups" yaml:"groups"` }
GatewayAPIGroups gateway API groups
swagger:model GatewayAPIGroups
func (*GatewayAPIGroups) ContextValidate ¶
ContextValidate validate this gateway API groups based on the context it is used
func (*GatewayAPIGroups) MarshalBinary ¶
func (m *GatewayAPIGroups) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GatewayAPIGroups) UnmarshalBinary ¶
func (m *GatewayAPIGroups) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GatewayTokenExchangeSettings ¶
type GatewayTokenExchangeSettings struct { // enabled Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"` // trusted idp ids TrustedIdpIds []string `json:"trusted_idp_ids" yaml:"trusted_idp_ids"` }
GatewayTokenExchangeSettings gateway token exchange settings
swagger:model GatewayTokenExchangeSettings
func (*GatewayTokenExchangeSettings) ContextValidate ¶
func (m *GatewayTokenExchangeSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this gateway token exchange settings based on context it is used
func (*GatewayTokenExchangeSettings) MarshalBinary ¶
func (m *GatewayTokenExchangeSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GatewayTokenExchangeSettings) UnmarshalBinary ¶
func (m *GatewayTokenExchangeSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GatewayWithClient ¶
type GatewayWithClient struct { // authorization server id // Example: default AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // client Client *Client `json:"client,omitempty" yaml:"client,omitempty"` // id of a client created for this gateway for authentication ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // if true services are created automatically for each new discovered api group CreateAndBindServicesAutomatically bool `json:"create_and_bind_services_automatically,omitempty" yaml:"create_and_bind_services_automatically,omitempty"` // default policy id assigned to new APIs DefaultPolicyID string `json:"default_policy_id,omitempty" yaml:"default_policy_id,omitempty"` // description Description string `json:"description,omitempty" yaml:"description,omitempty"` // unique gateway id // Example: 1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // issuer url IssuerURL string `json:"issuer_url,omitempty" yaml:"issuer_url,omitempty"` // last time a client fetched configuration // Format: date-time LastActive strfmt.DateTime `json:"last_active,omitempty" yaml:"last_active,omitempty"` // gateway name // Example: Cloudentity Pyron Name string `json:"name,omitempty" yaml:"name,omitempty"` // server url ServerURL string `json:"server_url,omitempty" yaml:"server_url,omitempty"` // tenant id // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange TokenExchange *GatewayTokenExchangeSettings `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"` // Token exchange client id TokenExchangeClientID string `json:"token_exchange_client_id,omitempty" yaml:"token_exchange_client_id,omitempty"` // gateway type, one of: pyron, aws // Example: pyron Type string `json:"type,omitempty" yaml:"type,omitempty"` }
GatewayWithClient gateway with client
swagger:model GatewayWithClient
func (*GatewayWithClient) ContextValidate ¶
ContextValidate validate this gateway with client based on the context it is used
func (*GatewayWithClient) MarshalBinary ¶
func (m *GatewayWithClient) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GatewayWithClient) UnmarshalBinary ¶
func (m *GatewayWithClient) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Gateways ¶
type Gateways struct { // gateways Gateways []*Gateway `json:"gateways" yaml:"gateways"` }
Gateways gateways
swagger:model Gateways
func (*Gateways) ContextValidate ¶
ContextValidate validate this gateways based on the context it is used
func (*Gateways) MarshalBinary ¶
MarshalBinary interface implementation
func (*Gateways) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type GithubCredentials ¶
type GithubCredentials struct { // OAuth client application secret from your GitHub Oauth application settings ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"` }
GithubCredentials GitHub IDP specific credentials
swagger:model GithubCredentials
func (*GithubCredentials) ContextValidate ¶
ContextValidate validates this github credentials based on context it is used
func (*GithubCredentials) MarshalBinary ¶
func (m *GithubCredentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GithubCredentials) UnmarshalBinary ¶
func (m *GithubCredentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GithubEmbeddedIDP ¶
type GithubEmbeddedIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
GithubEmbeddedIDP github embedded ID p
swagger:model GithubEmbeddedIDP
func (*GithubEmbeddedIDP) ContextValidate ¶
ContextValidate validate this github embedded ID p based on the context it is used
func (*GithubEmbeddedIDP) MarshalBinary ¶
func (m *GithubEmbeddedIDP) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GithubEmbeddedIDP) UnmarshalBinary ¶
func (m *GithubEmbeddedIDP) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GithubIDP ¶
type GithubIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // credentials Credentials *GithubCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // settings Settings *GithubSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
GithubIDP github ID p
swagger:model GithubIDP
func (*GithubIDP) ContextValidate ¶
ContextValidate validate this github ID p based on the context it is used
func (*GithubIDP) MarshalBinary ¶
MarshalBinary interface implementation
func (*GithubIDP) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type GithubSettings ¶
type GithubSettings struct { // Client ID of your OAuth application registered in GitHub // // You can find your client ID in GitHub > Settings > Developer Settings > OAuth Apps > Your Application // Example: client ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // If enabled, the groups a user belongs to are collected // // If enabled, the `groups` attribute from the authentication context gets populated with the // user's groups and takes from of `organization_id.group name` FetchGroups bool `json:"fetch_groups,omitempty" yaml:"fetch_groups,omitempty"` // An array of allowed OAuth scopes which the client requests // // The following scopes can be configured for GitHub application: // `phone`, `email`, `openid`, `profile`. // Example: ["email","profile","openid"] Scopes []string `json:"scopes" yaml:"scopes"` // Whether to send the identifier as a `login_hint` parameter to the IDP SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"` }
GithubSettings GitHub IDP specific settings
swagger:model GithubSettings
func (*GithubSettings) ContextValidate ¶
ContextValidate validates this github settings based on context it is used
func (*GithubSettings) MarshalBinary ¶
func (m *GithubSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GithubSettings) UnmarshalBinary ¶
func (m *GithubSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GoogleCredentials ¶
type GoogleCredentials struct { // OAuth client application secret ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"` }
GoogleCredentials Google IDP specific credentials
swagger:model GoogleCredentials
func (*GoogleCredentials) ContextValidate ¶
ContextValidate validates this google credentials based on context it is used
func (*GoogleCredentials) MarshalBinary ¶
func (m *GoogleCredentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GoogleCredentials) UnmarshalBinary ¶
func (m *GoogleCredentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GoogleEmbeddedIDP ¶
type GoogleEmbeddedIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
GoogleEmbeddedIDP google embedded ID p
swagger:model GoogleEmbeddedIDP
func (*GoogleEmbeddedIDP) ContextValidate ¶
ContextValidate validate this google embedded ID p based on the context it is used
func (*GoogleEmbeddedIDP) MarshalBinary ¶
func (m *GoogleEmbeddedIDP) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GoogleEmbeddedIDP) UnmarshalBinary ¶
func (m *GoogleEmbeddedIDP) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GoogleIDP ¶
type GoogleIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // credentials Credentials *GoogleCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // settings Settings *GoogleSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
GoogleIDP google ID p
swagger:model GoogleIDP
func (*GoogleIDP) ContextValidate ¶
ContextValidate validate this google ID p based on the context it is used
func (*GoogleIDP) MarshalBinary ¶
MarshalBinary interface implementation
func (*GoogleIDP) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type GoogleSettings ¶
type GoogleSettings struct { // OAuth client application identifier // Example: client ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // If enabled, users' data is collected by calling the `userinfo` endpoint. GetUserInfo bool `json:"get_user_info,omitempty" yaml:"get_user_info,omitempty"` // URL used to define the {baseURL} for any OpenID Connect endpoint when authorizing against ACP. IssuerURL string `json:"issuer_url,omitempty" yaml:"issuer_url,omitempty"` // An array of additional scopes your client requests // Example: ["email","profile","openid"] Scopes []string `json:"scopes" yaml:"scopes"` // Whether to send the identifier as a `login_hint` parameter to the IDP SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"` }
GoogleSettings Google IDP specific settings
swagger:model GoogleSettings
func (*GoogleSettings) ContextValidate ¶
ContextValidate validates this google settings based on context it is used
func (*GoogleSettings) MarshalBinary ¶
func (m *GoogleSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GoogleSettings) UnmarshalBinary ¶
func (m *GoogleSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GrantIdentityPoolRoleRequest ¶
type GrantIdentityPoolRoleRequest struct { // identity pool user pool id IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // identity pool user id IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"` // idp user idp id IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"` // role // Example: user_manager // Enum: ["user_manager"] Role string `json:"role,omitempty" yaml:"role,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type // Enum: ["identity_pool_user","idp"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // idp user workspace id WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
GrantIdentityPoolRoleRequest grant identity pool role request
swagger:model GrantIdentityPoolRoleRequest
func (*GrantIdentityPoolRoleRequest) ContextValidate ¶
func (m *GrantIdentityPoolRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this grant identity pool role request based on context it is used
func (*GrantIdentityPoolRoleRequest) MarshalBinary ¶
func (m *GrantIdentityPoolRoleRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GrantIdentityPoolRoleRequest) UnmarshalBinary ¶
func (m *GrantIdentityPoolRoleRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GrantTenantRoleRequest ¶
type GrantTenantRoleRequest struct { // identity pool user pool id IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // identity pool user id IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"` // idp user idp id IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"` // role // Example: admin // Enum: ["admin","business_admin","auditor","member"] Role string `json:"role,omitempty" yaml:"role,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type // Enum: ["identity_pool_user","idp"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // idp user workspace id WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
GrantTenantRoleRequest grant tenant role request
swagger:model GrantTenantRoleRequest
func (*GrantTenantRoleRequest) ContextValidate ¶
func (m *GrantTenantRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this grant tenant role request based on context it is used
func (*GrantTenantRoleRequest) MarshalBinary ¶
func (m *GrantTenantRoleRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GrantTenantRoleRequest) UnmarshalBinary ¶
func (m *GrantTenantRoleRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GrantWorkspaceRoleRequest ¶
type GrantWorkspaceRoleRequest struct { // identity pool user pool id IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // identity pool user id IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"` // idp user idp id IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"` // role // Example: admin // Enum: ["admin","auditor","manager","user_manager","member"] Role string `json:"role,omitempty" yaml:"role,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type // Enum: ["identity_pool_user","idp"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // idp user workspace id WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
GrantWorkspaceRoleRequest grant workspace role request
swagger:model GrantWorkspaceRoleRequest
func (*GrantWorkspaceRoleRequest) ContextValidate ¶
func (m *GrantWorkspaceRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this grant workspace role request based on context it is used
func (*GrantWorkspaceRoleRequest) MarshalBinary ¶
func (m *GrantWorkspaceRoleRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GrantWorkspaceRoleRequest) UnmarshalBinary ¶
func (m *GrantWorkspaceRoleRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GraphQLField ¶
type GraphQLField struct { // if false it is not possible to assign a policy, set to false if policy is declaratively assigned CanHavePolicy bool `json:"can_have_policy,omitempty" yaml:"can_have_policy,omitempty"` // name of graphQL field // Example: id Name string `json:"name,omitempty" yaml:"name,omitempty"` // optional id of a policy // Example: block PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"` }
GraphQLField graph q l field
swagger:model GraphQLField
func (*GraphQLField) ContextValidate ¶
ContextValidate validates this graph q l field based on context it is used
func (*GraphQLField) MarshalBinary ¶
func (m *GraphQLField) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GraphQLField) UnmarshalBinary ¶
func (m *GraphQLField) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GraphQLType ¶
type GraphQLType struct { // if false it is not possible to assign a policy, set to false if policy is declaratively assigned CanHavePolicy bool `json:"can_have_policy,omitempty" yaml:"can_have_policy,omitempty"` // optional fields of graphql type Fields []*GraphQLField `json:"fields" yaml:"fields"` // name of graphQL type, currently supported types are Interfaces and Objects // Example: block Name string `json:"name,omitempty" yaml:"name,omitempty"` // optional id of a policy // Example: block PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"` }
GraphQLType graph q l type
swagger:model GraphQLType
func (*GraphQLType) ContextValidate ¶
ContextValidate validate this graph q l type based on the context it is used
func (*GraphQLType) MarshalBinary ¶
func (m *GraphQLType) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*GraphQLType) UnmarshalBinary ¶
func (m *GraphQLType) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type GraphQLTypes ¶
type GraphQLTypes []*GraphQLType
GraphQLTypes graph q l types
swagger:model GraphQLTypes
func (GraphQLTypes) ContextValidate ¶
ContextValidate validate this graph q l types based on the context it is used
type HTTPRequest ¶
type HTTPRequest struct { // request body Body string `json:"body,omitempty" yaml:"body,omitempty"` // http method // Example: GET // Required: true Method string `json:"method" yaml:"method"` // url path // Required: true Path string `json:"path" yaml:"path"` // url query params Query []*HTTPRequestParam `json:"query" yaml:"query"` }
HTTPRequest HTTP request
swagger:model HTTPRequest
func (*HTTPRequest) ContextValidate ¶
ContextValidate validate this HTTP request based on the context it is used
func (*HTTPRequest) MarshalBinary ¶
func (m *HTTPRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*HTTPRequest) UnmarshalBinary ¶
func (m *HTTPRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type HTTPRequestParam ¶
type HTTPRequestParam struct { // name // Required: true Name string `json:"name" yaml:"name"` // value Value string `json:"value,omitempty" yaml:"value,omitempty"` }
HTTPRequestParam HTTP request param
swagger:model HTTPRequestParam
func (*HTTPRequestParam) ContextValidate ¶
ContextValidate validates this HTTP request param based on context it is used
func (*HTTPRequestParam) MarshalBinary ¶
func (m *HTTPRequestParam) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*HTTPRequestParam) UnmarshalBinary ¶
func (m *HTTPRequestParam) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IDPBase ¶
type IDPBase struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
IDPBase ID p base
swagger:model IDPBase
func (*IDPBase) ContextValidate ¶
ContextValidate validate this ID p base based on the context it is used
func (*IDPBase) MarshalBinary ¶
MarshalBinary interface implementation
func (*IDPBase) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type IDPConfiguration ¶
type IDPConfiguration struct { // If set to `true`, the claims are reloaded while issuing an access token. // // Currently it is only available for Identity Pool IDP. ReloadClaimsAtRefreshToken bool `json:"reload_claims_at_refresh_token,omitempty" yaml:"reload_claims_at_refresh_token,omitempty"` }
IDPConfiguration ID p configuration
swagger:model IDPConfiguration
func (*IDPConfiguration) ContextValidate ¶
ContextValidate validates this ID p configuration based on context it is used
func (*IDPConfiguration) MarshalBinary ¶
func (m *IDPConfiguration) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IDPConfiguration) UnmarshalBinary ¶
func (m *IDPConfiguration) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IDPDiscovery ¶
type IDPDiscovery struct { // discovery mode // Enum: ["domain_matching","script_execution"] DiscoveryMode string `json:"discovery_mode,omitempty" yaml:"discovery_mode,omitempty"` // If enabled, IDP discovery automatically redirects the user to their own IDP and does not // display IDPs of other users while the users accesses the server/application. // Example: false Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"` }
IDPDiscovery ID p discovery
swagger:model IDPDiscovery
func (*IDPDiscovery) ContextValidate ¶
ContextValidate validates this ID p discovery based on context it is used
func (*IDPDiscovery) MarshalBinary ¶
func (m *IDPDiscovery) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IDPDiscovery) UnmarshalBinary ¶
func (m *IDPDiscovery) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IDPDiscoverySettings ¶
type IDPDiscoverySettings struct { // An array of email domains configured for an IDP for the purposes of IDP discovery // // If a domain is connected to an IDP and this domain is used during the login process, the IDP // is automatically discovered and the user is either presented with a suggested IDP or is // instantly redirected to their IDP configured for the user's email domain. Domains []IDPDomain `json:"domains" yaml:"domains"` // When enabled, this provider will appear on the selection list, in case the discovery process // could not find a matching provider. This can be used to limit the username enumeration attacks // and at least one of the providers is recommended to be set as fallback provider. FallbackProvider bool `json:"fallback_provider,omitempty" yaml:"fallback_provider,omitempty"` // When enabled, the system will first attempt to find the identifier in the corresponding user store. // // This function is only applicable for Identity Pools and Identity Providers that have Provisioning // mechanism activated. IdentifierBasedMatching bool `json:"identifier_based_matching,omitempty" yaml:"identifier_based_matching,omitempty"` // If the intelligent IDP discovery is enabled and the instant redirect flag is on, the user is // instantly redirected to a proper Identity Provider as soon as a match is hit based on the // domain when a user is typing their email in the username field InstantRedirect bool `json:"instant_redirect,omitempty" yaml:"instant_redirect,omitempty"` }
IDPDiscoverySettings ID p discovery settings
swagger:model IDPDiscoverySettings
func (*IDPDiscoverySettings) ContextValidate ¶
ContextValidate validate this ID p discovery settings based on the context it is used
func (*IDPDiscoverySettings) MarshalBinary ¶
func (m *IDPDiscoverySettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IDPDiscoverySettings) UnmarshalBinary ¶
func (m *IDPDiscoverySettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IDPDomain ¶
type IDPDomain string
IDPDomain ID p domain
swagger:model IDPDomain
func (IDPDomain) ContextValidate ¶
ContextValidate validates this ID p domain based on context it is used
type IDPPayload ¶
type IDPPayload struct { // Unique identifierof IDP. ID string `json:"id,omitempty" yaml:"id,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP, e.g. google, saml Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of IDP. Name string `json:"name,omitempty" yaml:"name,omitempty"` }
IDPPayload ID p payload
swagger:model IDPPayload
func (*IDPPayload) ContextValidate ¶
ContextValidate validate this ID p payload based on the context it is used
func (*IDPPayload) MarshalBinary ¶
func (m *IDPPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IDPPayload) UnmarshalBinary ¶
func (m *IDPPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IDPSSODescriptor ¶
type IDPSSODescriptor struct { // artifact resolution services ArtifactResolutionServices []*Endpoint `json:"ArtifactResolutionServices" yaml:"ArtifactResolutionServices"` // assertion ID request services AssertionIDRequestServices []*Endpoint `json:"AssertionIDRequestServices" yaml:"AssertionIDRequestServices"` // attribute profiles AttributeProfiles []string `json:"AttributeProfiles" yaml:"AttributeProfiles"` // attributes Attributes []*Attribute `json:"Attributes" yaml:"Attributes"` // cache duration CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"` // contact people ContactPeople []*ContactPerson `json:"ContactPeople" yaml:"ContactPeople"` // error URL ErrorURL string `json:"ErrorURL,omitempty" yaml:"ErrorURL,omitempty"` // ID ID string `json:"ID,omitempty" yaml:"ID,omitempty"` // key descriptors KeyDescriptors []*KeyDescriptor `json:"KeyDescriptors" yaml:"KeyDescriptors"` // manage name ID services ManageNameIDServices []*Endpoint `json:"ManageNameIDServices" yaml:"ManageNameIDServices"` // name ID formats NameIDFormats []NameIDFormat `json:"NameIDFormats" yaml:"NameIDFormats"` // name ID mapping services NameIDMappingServices []*Endpoint `json:"NameIDMappingServices" yaml:"NameIDMappingServices"` // organization Organization *Organization `json:"Organization,omitempty" yaml:"Organization,omitempty"` // protocol support enumeration ProtocolSupportEnumeration string `json:"ProtocolSupportEnumeration,omitempty" yaml:"ProtocolSupportEnumeration,omitempty"` // signature Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"` // single logout services SingleLogoutServices []*Endpoint `json:"SingleLogoutServices" yaml:"SingleLogoutServices"` // single sign on services SingleSignOnServices []*Endpoint `json:"SingleSignOnServices" yaml:"SingleSignOnServices"` // valid until // Format: date-time ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"` // want authn requests signed WantAuthnRequestsSigned bool `json:"WantAuthnRequestsSigned,omitempty" yaml:"WantAuthnRequestsSigned,omitempty"` // XML name XMLName *Name `json:"XMLName,omitempty" yaml:"XMLName,omitempty"` }
IDPSSODescriptor IDPSSODescriptor represents the SAML IDPSSODescriptorType object.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.3
swagger:model IDPSSODescriptor
func (*IDPSSODescriptor) ContextValidate ¶
ContextValidate validate this ID p s s o descriptor based on the context it is used
func (*IDPSSODescriptor) MarshalBinary ¶
func (m *IDPSSODescriptor) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IDPSSODescriptor) UnmarshalBinary ¶
func (m *IDPSSODescriptor) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IDPSSOSettings ¶
type IDPSSOSettings struct { // Opt this IDP out of workspace SSO enablement Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` }
IDPSSOSettings ID p s s o settings
swagger:model IDPSSOSettings
func (*IDPSSOSettings) ContextValidate ¶
ContextValidate validates this ID p s s o settings based on context it is used
func (*IDPSSOSettings) MarshalBinary ¶
func (m *IDPSSOSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IDPSSOSettings) UnmarshalBinary ¶
func (m *IDPSSOSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IDPTokenExchangeSettings ¶
type IDPTokenExchangeSettings struct { // If enabled token issued by this IDP can be used for token exchange Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"` }
IDPTokenExchangeSettings ID p token exchange settings
swagger:model IDPTokenExchangeSettings
func (*IDPTokenExchangeSettings) ContextValidate ¶
func (m *IDPTokenExchangeSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this ID p token exchange settings based on context it is used
func (*IDPTokenExchangeSettings) MarshalBinary ¶
func (m *IDPTokenExchangeSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IDPTokenExchangeSettings) UnmarshalBinary ¶
func (m *IDPTokenExchangeSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IDPsResponse ¶
type IDPsResponse struct { // idps Idps []*IDPBase `json:"idps" yaml:"idps"` }
IDPsResponse ID ps response
swagger:model IDPsResponse
func (*IDPsResponse) ContextValidate ¶
ContextValidate validate this ID ps response based on the context it is used
func (*IDPsResponse) MarshalBinary ¶
func (m *IDPsResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IDPsResponse) UnmarshalBinary ¶
func (m *IDPsResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IdentifierType ¶
type IdentifierType string
IdentifierType identifier type
swagger:model IdentifierType
func (IdentifierType) ContextValidate ¶
ContextValidate validates this identifier type based on context it is used
type IdentityAssuranceConfiguration ¶
type IdentityAssuranceConfiguration struct { // JSON array containing all attachment types supported by the OP. REQUIRED when OP supports attachments. Possible values are external and embedded. Attachments []string `json:"attachments" yaml:"attachments"` // If enabled, verified claims request via userinfo will be blocked BlockVerifiedClaimsViaUserinfo bool `json:"block_verified_claims_via_userinfo,omitempty" yaml:"block_verified_claims_via_userinfo,omitempty"` // REQUIRED when OP supports external attachments. JSON array containing all supported digest algorithms which can be used as alg property within // the digest object of external attachments. If the OP supports external attachments, at least the algorithm sha-256 MUST be supported by the OP as well. DigestAlgorithms []string `json:"digest_algorithms" yaml:"digest_algorithms"` // JSON array containing all identity document types utilized by the OP for identity verification. REQUIRED when evidence_supported contains "document". Documents []string `json:"documents" yaml:"documents"` // JSON array containing the check methods the OP supports for evidences of type "document". DocumentsCheckMethods []string `json:"documents_check_methods" yaml:"documents_check_methods"` // JSON array containing the methods the OP supports for evidences of type "document". DocumentsMethods []string `json:"documents_methods" yaml:"documents_methods"` // JSON array containing all electronic record types the OP supports. REQUIRED when evidence_supported contains "electronic_record". ElectronicRecords []string `json:"electronic_records" yaml:"electronic_records"` // Boolean value indicating support for verified_claims, i.e., the OpenID Connect for Identity Assurance extension. EnableVerifiedClaims bool `json:"enable_verified_claims,omitempty" yaml:"enable_verified_claims,omitempty"` // JSON array containing all types of identity evidence the OP uses. Evidence []string `json:"evidence" yaml:"evidence"` // JSON array containing all supported trust frameworks. TrustFrameworks []string `json:"trust_frameworks" yaml:"trust_frameworks"` }
IdentityAssuranceConfiguration identity assurance configuration
swagger:model IdentityAssuranceConfiguration
func (*IdentityAssuranceConfiguration) ContextValidate ¶
func (m *IdentityAssuranceConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this identity assurance configuration based on context it is used
func (*IdentityAssuranceConfiguration) MarshalBinary ¶
func (m *IdentityAssuranceConfiguration) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IdentityAssuranceConfiguration) UnmarshalBinary ¶
func (m *IdentityAssuranceConfiguration) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IdentityPoolIDP ¶
type IdentityPoolIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
IdentityPoolIDP identity pool ID p
swagger:model IdentityPoolIDP
func (*IdentityPoolIDP) ContextValidate ¶
ContextValidate validate this identity pool ID p based on the context it is used
func (*IdentityPoolIDP) MarshalBinary ¶
func (m *IdentityPoolIDP) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IdentityPoolIDP) UnmarshalBinary ¶
func (m *IdentityPoolIDP) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IdentityPoolRoleSubject ¶
type IdentityPoolRoleSubject struct { // identity pool user pool id IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // identity pool user id IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"` // idp user idp id IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"` // roles Roles *IdentityPoolRoles `json:"roles,omitempty" yaml:"roles,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type // Enum: ["identity_pool_user","idp"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // idp user workspace id WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
IdentityPoolRoleSubject identity pool role subject
swagger:model IdentityPoolRoleSubject
func (*IdentityPoolRoleSubject) ContextValidate ¶
func (m *IdentityPoolRoleSubject) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this identity pool role subject based on the context it is used
func (*IdentityPoolRoleSubject) MarshalBinary ¶
func (m *IdentityPoolRoleSubject) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IdentityPoolRoleSubject) UnmarshalBinary ¶
func (m *IdentityPoolRoleSubject) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IdentityPoolRoles ¶
type IdentityPoolRoles struct { // user manager UserManager bool `json:"user_manager,omitempty" yaml:"user_manager,omitempty"` }
IdentityPoolRoles identity pool roles
swagger:model IdentityPoolRoles
func (*IdentityPoolRoles) ContextValidate ¶
ContextValidate validates this identity pool roles based on context it is used
func (*IdentityPoolRoles) MarshalBinary ¶
func (m *IdentityPoolRoles) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IdentityPoolRoles) UnmarshalBinary ¶
func (m *IdentityPoolRoles) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IdentityPoolRolesResponse ¶
type IdentityPoolRolesResponse struct { // subjects Subjects []*IdentityPoolRoleSubject `json:"subjects" yaml:"subjects"` }
IdentityPoolRolesResponse identity pool roles response
swagger:model IdentityPoolRolesResponse
func (*IdentityPoolRolesResponse) ContextValidate ¶
func (m *IdentityPoolRolesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this identity pool roles response based on the context it is used
func (*IdentityPoolRolesResponse) MarshalBinary ¶
func (m *IdentityPoolRolesResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IdentityPoolRolesResponse) UnmarshalBinary ¶
func (m *IdentityPoolRolesResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Image ¶
type Image struct { // url URL string `json:"url,omitempty" yaml:"url,omitempty"` }
Image image
swagger:model Image
func (*Image) ContextValidate ¶
ContextValidate validates this image based on context it is used
func (*Image) MarshalBinary ¶
MarshalBinary interface implementation
func (*Image) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type Images ¶
type Images struct { // images Images []*Image `json:"images" yaml:"images"` }
Images images
swagger:model Images
func (*Images) ContextValidate ¶
ContextValidate validate this images based on the context it is used
func (*Images) MarshalBinary ¶
MarshalBinary interface implementation
func (*Images) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type ImportServiceConfigurationResult ¶
type ImportServiceConfigurationResult struct { // Authorization server identifier // Example: my-server AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // created apis CreatedApis []*API `json:"created_apis" yaml:"created_apis"` // created policies CreatedPolicies []*Policy `json:"created_policies" yaml:"created_policies"` // created scopes CreatedScopes []*Scope `json:"created_scopes" yaml:"created_scopes"` // Custom service audience // Example: https://api.example.com CustomAudience string `json:"custom_audience,omitempty" yaml:"custom_audience,omitempty"` // Service description // Example: Service description Description string `json:"description,omitempty" yaml:"description,omitempty"` // Gateway identifier // Example: gateway-1 GatewayID string `json:"gateway_id,omitempty" yaml:"gateway_id,omitempty"` // A unique identifier of a service // Example: service-1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // Service name // Example: My service Name string `json:"name,omitempty" yaml:"name,omitempty"` // not removed policies NotRemovedPolicies []*Policy `json:"not_removed_policies" yaml:"not_removed_policies"` // removed apis RemovedApis []*API `json:"removed_apis" yaml:"removed_apis"` // removed policies RemovedPolicies []*Policy `json:"removed_policies" yaml:"removed_policies"` // `true` when the service is a system service // Example: false System bool `json:"system,omitempty" yaml:"system,omitempty"` // Tenant identifier // Example: my-company TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // Service type // Enum: ["oauth2","oidc","system","user","openbanking"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // The date of service update // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"` // `true` when the service has the OpenAPI 3.0 specification WithSpecification bool `json:"with_specification,omitempty" yaml:"with_specification,omitempty"` }
ImportServiceConfigurationResult import service configuration result
swagger:model ImportServiceConfigurationResult
func (*ImportServiceConfigurationResult) ContextValidate ¶
func (m *ImportServiceConfigurationResult) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this import service configuration result based on the context it is used
func (*ImportServiceConfigurationResult) MarshalBinary ¶
func (m *ImportServiceConfigurationResult) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ImportServiceConfigurationResult) UnmarshalBinary ¶
func (m *ImportServiceConfigurationResult) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IndexedEndpoint ¶
type IndexedEndpoint struct { // binding Binding string `json:"Binding,omitempty" yaml:"Binding,omitempty"` // index Index int64 `json:"Index,omitempty" yaml:"Index,omitempty"` // is default IsDefault bool `json:"IsDefault,omitempty" yaml:"IsDefault,omitempty"` // location Location string `json:"Location,omitempty" yaml:"Location,omitempty"` // response location ResponseLocation string `json:"ResponseLocation,omitempty" yaml:"ResponseLocation,omitempty"` }
IndexedEndpoint IndexedEndpoint represents the SAML IndexedEndpointType object.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.2.3
swagger:model IndexedEndpoint
func (*IndexedEndpoint) ContextValidate ¶
ContextValidate validates this indexed endpoint based on context it is used
func (*IndexedEndpoint) MarshalBinary ¶
func (m *IndexedEndpoint) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IndexedEndpoint) UnmarshalBinary ¶
func (m *IndexedEndpoint) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type InitialAccessTokenSettings ¶
type InitialAccessTokenSettings struct { // Enables initial access token for dynamic client registration // // If enabled, the registration endpoint requires an access token with the dcr_register scope granted. // To issue the access token, you need a separate client with the client credentials grant type. // Upon successful registration, the access token is terminated. Required bool `json:"required,omitempty" yaml:"required,omitempty"` }
InitialAccessTokenSettings initial access token settings
swagger:model InitialAccessTokenSettings
func (*InitialAccessTokenSettings) ContextValidate ¶
func (m *InitialAccessTokenSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this initial access token settings based on context it is used
func (*InitialAccessTokenSettings) MarshalBinary ¶
func (m *InitialAccessTokenSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*InitialAccessTokenSettings) UnmarshalBinary ¶
func (m *InitialAccessTokenSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IntelliTrustCredentials ¶
type IntelliTrustCredentials struct { // OAuth client application secret from your Entrust Datacard® IntelliTrust™ Authentication // Service general settings ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"` }
IntelliTrustCredentials IntelliTrust™ IDP specific credentials
swagger:model IntelliTrustCredentials
func (*IntelliTrustCredentials) ContextValidate ¶
func (m *IntelliTrustCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this intelli trust credentials based on context it is used
func (*IntelliTrustCredentials) MarshalBinary ¶
func (m *IntelliTrustCredentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IntelliTrustCredentials) UnmarshalBinary ¶
func (m *IntelliTrustCredentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IntelliTrustIDP ¶
type IntelliTrustIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // credentials Credentials *IntelliTrustCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // settings Settings *IntelliTrustSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
IntelliTrustIDP intelli trust ID p
swagger:model IntelliTrustIDP
func (*IntelliTrustIDP) ContextValidate ¶
ContextValidate validate this intelli trust ID p based on the context it is used
func (*IntelliTrustIDP) MarshalBinary ¶
func (m *IntelliTrustIDP) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IntelliTrustIDP) UnmarshalBinary ¶
func (m *IntelliTrustIDP) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type IntelliTrustSettings ¶
type IntelliTrustSettings struct { // OAuth client application identifier from your Entrust Datacard® IntelliTrust™ Authentication // Service general settings // Example: client ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // String represented domain of the Entrust Datacard® IntelliTrust™ Authentication Service for your organization // Example: cloudentity-dev.us.trustedauth.com Domain string `json:"domain,omitempty" yaml:"domain,omitempty"` // If enabled, the groups a user belongs to are collected // // If you want to fetch groups from the IntelliTrust™ IDP, you need to add the `groups` claim // for your application on the IDP side. FetchGroups bool `json:"fetch_groups,omitempty" yaml:"fetch_groups,omitempty"` // If enabled, users' data is collected by calling the `userinfo` IntelliTrust™ endpoint. GetUserInfo bool `json:"get_user_info,omitempty" yaml:"get_user_info,omitempty"` // An array of additional scopes your client requests // Example: ["email","profile","openid"] Scopes []string `json:"scopes" yaml:"scopes"` // Whether to send the identifier as a `login_hint` parameter to the IDP SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"` }
IntelliTrustSettings IntelliTrust™ IDP specific settings
swagger:model IntelliTrustSettings
func (*IntelliTrustSettings) ContextValidate ¶
ContextValidate validates this intelli trust settings based on context it is used
func (*IntelliTrustSettings) MarshalBinary ¶
func (m *IntelliTrustSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*IntelliTrustSettings) UnmarshalBinary ¶
func (m *IntelliTrustSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Intermediary ¶
type Intermediary struct { // Array of strings representing ways to contact people responsible for this intermediary Contacts []string `json:"contacts" yaml:"contacts"` // A short description of the intermediary Description string `json:"description,omitempty" yaml:"description,omitempty"` // A URL string that references a logo for this intermediary LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // Name of intermediary party Name string `json:"name,omitempty" yaml:"name,omitempty"` // Registry references for this intermediary RegistryReferences []*RegistryReference `json:"registry_references" yaml:"registry_references"` // A URL string of a web page providing information about the intermediary URI string `json:"uri,omitempty" yaml:"uri,omitempty"` }
Intermediary intermediary
swagger:model Intermediary
func (*Intermediary) ContextValidate ¶
ContextValidate validate this intermediary based on the context it is used
func (*Intermediary) MarshalBinary ¶
func (m *Intermediary) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*Intermediary) UnmarshalBinary ¶
func (m *Intermediary) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type JITAdressVerificationMode ¶
type JITAdressVerificationMode string
JITAdressVerificationMode j i t adress verification mode
swagger:model JITAdressVerificationMode
func (JITAdressVerificationMode) ContextValidate ¶
func (m JITAdressVerificationMode) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this j i t adress verification mode based on context it is used
type JITCreatedPayload ¶
type JITCreatedPayload struct { // admin role type AdminRoleType string `json:"admin_role_type,omitempty" yaml:"admin_role_type,omitempty"` // idp Idp *IDPPayload `json:"idp,omitempty" yaml:"idp,omitempty"` // pool id PoolID string `json:"pool_id,omitempty" yaml:"pool_id,omitempty"` // user id UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"` }
JITCreatedPayload j i t created payload
swagger:model JITCreatedPayload
func (*JITCreatedPayload) ContextValidate ¶
ContextValidate validate this j i t created payload based on the context it is used
func (*JITCreatedPayload) MarshalBinary ¶
func (m *JITCreatedPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*JITCreatedPayload) UnmarshalBinary ¶
func (m *JITCreatedPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type JITFailedPayload ¶
type JITFailedPayload struct { // error Error string `json:"error,omitempty" yaml:"error,omitempty"` // idp Idp *IDPPayload `json:"idp,omitempty" yaml:"idp,omitempty"` // idp sub IdpSub string `json:"idp_sub,omitempty" yaml:"idp_sub,omitempty"` // pool id PoolID string `json:"pool_id,omitempty" yaml:"pool_id,omitempty"` // user mapping UserMapping *JITUser `json:"user_mapping,omitempty" yaml:"user_mapping,omitempty"` // user to provision UserToProvision map[string]interface{} `json:"user_to_provision,omitempty" yaml:"user_to_provision,omitempty"` }
JITFailedPayload j i t failed payload
swagger:model JITFailedPayload
func (*JITFailedPayload) ContextValidate ¶
ContextValidate validate this j i t failed payload based on the context it is used
func (*JITFailedPayload) MarshalBinary ¶
func (m *JITFailedPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*JITFailedPayload) UnmarshalBinary ¶
func (m *JITFailedPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type JITProvisioning ¶
type JITProvisioning struct { // Admin role assigned to the provisioned user if JIT is enabled (available only for admin workspaces only) // Enum: ["admin","business_admin","auditor","member"] AdminRoleType string `json:"admin_role_type,omitempty" yaml:"admin_role_type,omitempty"` // identifier salt IdentifierSalt string `json:"identifier_salt,omitempty" yaml:"identifier_salt,omitempty"` // mode Mode ProvisioningMode `json:"mode,omitempty" yaml:"mode,omitempty"` // pool id PoolID string `json:"pool_id,omitempty" yaml:"pool_id,omitempty"` // user User *JITUser `json:"user,omitempty" yaml:"user,omitempty"` }
JITProvisioning j i t provisioning
swagger:model JITProvisioning
func (*JITProvisioning) ContextValidate ¶
ContextValidate validate this j i t provisioning based on the context it is used
func (*JITProvisioning) MarshalBinary ¶
func (m *JITProvisioning) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*JITProvisioning) UnmarshalBinary ¶
func (m *JITProvisioning) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type JITSettings ¶
type JITSettings struct { // enabled Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"` // provisioning Provisioning *JITProvisioning `json:"provisioning,omitempty" yaml:"provisioning,omitempty"` }
JITSettings j i t settings
swagger:model JITSettings
func (*JITSettings) ContextValidate ¶
ContextValidate validate this j i t settings based on the context it is used
func (*JITSettings) MarshalBinary ¶
func (m *JITSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*JITSettings) UnmarshalBinary ¶
func (m *JITSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type JITUpdatedPayload ¶
type JITUpdatedPayload struct { // idp Idp *IDPPayload `json:"idp,omitempty" yaml:"idp,omitempty"` // new account linked NewAccountLinked bool `json:"new_account_linked,omitempty" yaml:"new_account_linked,omitempty"` // pool id PoolID string `json:"pool_id,omitempty" yaml:"pool_id,omitempty"` // user id UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"` }
JITUpdatedPayload j i t updated payload
swagger:model JITUpdatedPayload
func (*JITUpdatedPayload) ContextValidate ¶
ContextValidate validate this j i t updated payload based on the context it is used
func (*JITUpdatedPayload) MarshalBinary ¶
func (m *JITUpdatedPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*JITUpdatedPayload) UnmarshalBinary ¶
func (m *JITUpdatedPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type JITUser ¶
type JITUser struct { // addresses Addresses []*JITUserAddress `json:"addresses" yaml:"addresses"` // attributes mapping AttributesMapping UserAttributesMapping `json:"attributes_mapping,omitempty" yaml:"attributes_mapping,omitempty"` // identifiers Identifiers []*JITUserIdentifier `json:"identifiers" yaml:"identifiers"` }
JITUser j i t user
swagger:model JITUser
func (*JITUser) ContextValidate ¶
ContextValidate validate this j i t user based on the context it is used
func (*JITUser) MarshalBinary ¶
MarshalBinary interface implementation
func (*JITUser) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type JITUserAddress ¶
type JITUserAddress struct { // source Source string `json:"source,omitempty" yaml:"source,omitempty"` // type Type IdentifierType `json:"type,omitempty" yaml:"type,omitempty"` // verification mode VerificationMode JITAdressVerificationMode `json:"verification_mode,omitempty" yaml:"verification_mode,omitempty"` }
JITUserAddress j i t user address
swagger:model JITUserAddress
func (*JITUserAddress) ContextValidate ¶
ContextValidate validate this j i t user address based on the context it is used
func (*JITUserAddress) MarshalBinary ¶
func (m *JITUserAddress) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*JITUserAddress) UnmarshalBinary ¶
func (m *JITUserAddress) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type JITUserIdentifier ¶
type JITUserIdentifier struct { // source Source string `json:"source,omitempty" yaml:"source,omitempty"` // type Type IdentifierType `json:"type,omitempty" yaml:"type,omitempty"` }
JITUserIdentifier j i t user identifier
swagger:model JITUserIdentifier
func (*JITUserIdentifier) ContextValidate ¶
ContextValidate validate this j i t user identifier based on the context it is used
func (*JITUserIdentifier) MarshalBinary ¶
func (m *JITUserIdentifier) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*JITUserIdentifier) UnmarshalBinary ¶
func (m *JITUserIdentifier) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type JWSPayloadSettings ¶
type JWSPayloadSettings struct { // jwks Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"` // URI of the JWKs of the trusted party responsible for signing request body JwksURI string `json:"jwks_uri,omitempty" yaml:"jwks_uri,omitempty"` // JWK source - defines where are the keys for validating dcr request signature // Keys can be defined at server level or can be taken from jwks_uri claim from the software statement sent by the client Source string `json:"source,omitempty" yaml:"source,omitempty"` }
JWSPayloadSettings j w s payload settings
swagger:model JWSPayloadSettings
func (*JWSPayloadSettings) ContextValidate ¶
ContextValidate validate this j w s payload settings based on the context it is used
func (*JWSPayloadSettings) MarshalBinary ¶
func (m *JWSPayloadSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*JWSPayloadSettings) UnmarshalBinary ¶
func (m *JWSPayloadSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type JwtClaims ¶
type JwtClaims map[string]interface{}
JwtClaims jwt claims
swagger:model JwtClaims
func (JwtClaims) ContextValidate ¶
ContextValidate validates this jwt claims based on context it is used
type KeyDescriptor ¶
type KeyDescriptor struct { // encryption methods EncryptionMethods []*EncryptionMethod `json:"EncryptionMethods" yaml:"EncryptionMethods"` // key info KeyInfo *KeyInfo `json:"KeyInfo,omitempty" yaml:"KeyInfo,omitempty"` // use Use string `json:"Use,omitempty" yaml:"Use,omitempty"` }
KeyDescriptor KeyDescriptor represents the XMLSEC object of the same name
swagger:model KeyDescriptor
func (*KeyDescriptor) ContextValidate ¶
ContextValidate validate this key descriptor based on the context it is used
func (*KeyDescriptor) MarshalBinary ¶
func (m *KeyDescriptor) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*KeyDescriptor) UnmarshalBinary ¶
func (m *KeyDescriptor) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type KeyInfo ¶
type KeyInfo struct { // x509 data X509Data *X509Data `json:"X509Data,omitempty" yaml:"X509Data,omitempty"` // XML name XMLName *Name `json:"XMLName,omitempty" yaml:"XMLName,omitempty"` }
KeyInfo KeyInfo represents the XMLSEC object of the same name
swagger:model KeyInfo
func (*KeyInfo) ContextValidate ¶
ContextValidate validate this key info based on the context it is used
func (*KeyInfo) MarshalBinary ¶
MarshalBinary interface implementation
func (*KeyInfo) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type KeysResponse ¶
type KeysResponse struct { // current key CurrentKey *ServerJWK `json:"current_key,omitempty" yaml:"current_key,omitempty"` // next key NextKey *ServerJWK `json:"next_key,omitempty" yaml:"next_key,omitempty"` // revoked keys RevokedKeys []*ServerJWK `json:"revoked_keys" yaml:"revoked_keys"` // rotated keys RotatedKeys []*ServerJWK `json:"rotated_keys" yaml:"rotated_keys"` }
KeysResponse keys response
swagger:model KeysResponse
func (*KeysResponse) ContextValidate ¶
ContextValidate validate this keys response based on the context it is used
func (*KeysResponse) MarshalBinary ¶
func (m *KeysResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*KeysResponse) UnmarshalBinary ¶
func (m *KeysResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type LegalEntity ¶
type LegalEntity struct { // party Party *FDXParty `json:"party,omitempty" yaml:"party,omitempty"` }
LegalEntity legal entity
swagger:model LegalEntity
func (*LegalEntity) ContextValidate ¶
ContextValidate validate this legal entity based on the context it is used
func (*LegalEntity) MarshalBinary ¶
func (m *LegalEntity) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*LegalEntity) UnmarshalBinary ¶
func (m *LegalEntity) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type License ¶
type License struct { // License end date // Example: 2023-03-01T09:02:27.127932Z // Format: date-time EndDate strfmt.DateTime `json:"end_date,omitempty" yaml:"end_date,omitempty"` // Is enterprise IDPs capability enabled HasEnterpriseIdpsCapability bool `json:"has_enterprise_idps_capability,omitempty" yaml:"has_enterprise_idps_capability,omitempty"` // License start date // Example: 2023-03-01T09:02:27.127932Z // Format: date-time StartDate strfmt.DateTime `json:"start_date,omitempty" yaml:"start_date,omitempty"` }
License license
swagger:model License
func (*License) ContextValidate ¶
ContextValidate validates this license based on context it is used
func (*License) MarshalBinary ¶
MarshalBinary interface implementation
func (*License) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type LocalizedName ¶
type LocalizedName struct { // lang Lang string `json:"Lang,omitempty" yaml:"Lang,omitempty"` // value Value string `json:"Value,omitempty" yaml:"Value,omitempty"` }
LocalizedName LocalizedName represents the SAML type localizedNameType.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.2.4
swagger:model LocalizedName
func (*LocalizedName) ContextValidate ¶
ContextValidate validates this localized name based on context it is used
func (*LocalizedName) MarshalBinary ¶
func (m *LocalizedName) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*LocalizedName) UnmarshalBinary ¶
func (m *LocalizedName) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type LocalizedURI ¶
type LocalizedURI struct { // lang Lang string `json:"Lang,omitempty" yaml:"Lang,omitempty"` // value Value string `json:"Value,omitempty" yaml:"Value,omitempty"` }
LocalizedURI LocalizedURI represents the SAML type localizedURIType.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.2.5
swagger:model LocalizedURI
func (*LocalizedURI) ContextValidate ¶
ContextValidate validates this localized URI based on context it is used
func (*LocalizedURI) MarshalBinary ¶
func (m *LocalizedURI) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*LocalizedURI) UnmarshalBinary ¶
func (m *LocalizedURI) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type LoginFailedPayload ¶
type LoginFailedPayload struct { // cause Cause string `json:"cause,omitempty" yaml:"cause,omitempty"` // details Details interface{} `json:"details,omitempty" yaml:"details,omitempty"` // error Error string `json:"error,omitempty" yaml:"error,omitempty"` // error description ErrorDescription string `json:"error_description,omitempty" yaml:"error_description,omitempty"` // error hint ErrorHint string `json:"error_hint,omitempty" yaml:"error_hint,omitempty"` // idp Idp *IDPPayload `json:"idp,omitempty" yaml:"idp,omitempty"` // status code StatusCode int64 `json:"status_code,omitempty" yaml:"status_code,omitempty"` }
LoginFailedPayload login failed payload
swagger:model LoginFailedPayload
func (*LoginFailedPayload) ContextValidate ¶
ContextValidate validate this login failed payload based on the context it is used
func (*LoginFailedPayload) MarshalBinary ¶
func (m *LoginFailedPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*LoginFailedPayload) UnmarshalBinary ¶
func (m *LoginFailedPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type LoginPayload ¶
type LoginPayload struct { // idp Idp *IDPPayload `json:"idp,omitempty" yaml:"idp,omitempty"` }
LoginPayload login payload
swagger:model LoginPayload
func (*LoginPayload) ContextValidate ¶
ContextValidate validate this login payload based on the context it is used
func (*LoginPayload) MarshalBinary ¶
func (m *LoginPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*LoginPayload) UnmarshalBinary ¶
func (m *LoginPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type MFAAuth ¶
type MFAAuth struct { // arculix Arculix *ArculixAuth `json:"arculix,omitempty" yaml:"arculix,omitempty"` // email Email *EmailAuth `json:"email,omitempty" yaml:"email,omitempty"` // sms Sms *SMSAuth `json:"sms,omitempty" yaml:"sms,omitempty"` }
MFAAuth m f a auth
swagger:model MFAAuth
func (*MFAAuth) ContextValidate ¶
ContextValidate validate this m f a auth based on the context it is used
func (*MFAAuth) MarshalBinary ¶
MarshalBinary interface implementation
func (*MFAAuth) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type MFAMethod ¶
type MFAMethod struct { // auth Auth *MFAAuth `json:"auth,omitempty" yaml:"auth,omitempty"` // enabled // Required: true Enabled bool `json:"enabled" yaml:"enabled"` // id ID string `json:"id,omitempty" yaml:"id,omitempty"` // mechanism // Example: email // Required: true // Enum: ["sms","email"] Mechanism string `json:"mechanism" yaml:"mechanism"` // settings Settings *MFASettings `json:"settings,omitempty" yaml:"settings,omitempty"` // tenant id // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` }
MFAMethod m f a method
swagger:model MFAMethod
func (*MFAMethod) ContextValidate ¶
ContextValidate validate this m f a method based on the context it is used
func (*MFAMethod) MarshalBinary ¶
MarshalBinary interface implementation
func (*MFAMethod) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type MFAMethodResponse ¶
type MFAMethodResponse struct { // auth Auth *MFAAuth `json:"auth,omitempty" yaml:"auth,omitempty"` // default email settings DefaultEmailSettings *DefaultEmailSettings `json:"default_email_settings,omitempty" yaml:"default_email_settings,omitempty"` // default sms settings DefaultSmsSettings *DefaultSMSSettings `json:"default_sms_settings,omitempty" yaml:"default_sms_settings,omitempty"` // enabled // Required: true Enabled bool `json:"enabled" yaml:"enabled"` // id ID string `json:"id,omitempty" yaml:"id,omitempty"` // mechanism // Example: email // Required: true // Enum: ["sms","email"] Mechanism string `json:"mechanism" yaml:"mechanism"` // settings Settings *MFASettings `json:"settings,omitempty" yaml:"settings,omitempty"` // tenant id // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` }
MFAMethodResponse m f a method response
swagger:model MFAMethodResponse
func (*MFAMethodResponse) ContextValidate ¶
ContextValidate validate this m f a method response based on the context it is used
func (*MFAMethodResponse) MarshalBinary ¶
func (m *MFAMethodResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*MFAMethodResponse) UnmarshalBinary ¶
func (m *MFAMethodResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type MFAMethods ¶
type MFAMethods struct { // mfa methods MfaMethods []*MFAMethod `json:"mfa_methods" yaml:"mfa_methods"` }
MFAMethods m f a methods
swagger:model MFAMethods
func (*MFAMethods) ContextValidate ¶
ContextValidate validate this m f a methods based on the context it is used
func (*MFAMethods) MarshalBinary ¶
func (m *MFAMethods) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*MFAMethods) UnmarshalBinary ¶
func (m *MFAMethods) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type MFASettings ¶
type MFASettings struct { // email Email *EmailSettings `json:"email,omitempty" yaml:"email,omitempty"` // sms Sms *SMSSettings `json:"sms,omitempty" yaml:"sms,omitempty"` }
MFASettings m f a settings
swagger:model MFASettings
func (*MFASettings) ContextValidate ¶
ContextValidate validate this m f a settings based on the context it is used
func (*MFASettings) MarshalBinary ¶
func (m *MFASettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*MFASettings) UnmarshalBinary ¶
func (m *MFASettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Mapping ¶
type Mapping struct { // If enabled, the decoder makes the following "weak" conversions: // // Bools to string (true = "1", false = "0") // // numbers to string (base 10) // // bools to int/uint (true = 1, false = 0) // // strings to int/uint (base implied by prefix) // // int to bool (true if value != 0) // // string to bool (accepts only the following: 1, t, T, TRUE, true, True, 0, f, F, FALSE, false, False) // // empty array = empty map and vice versa // // negative numbers to overflowed uint values (base 10) // // slice of maps to a merged map // // single values are converted to slices if required. Each element is weakly decoded. // Example: false AllowWeakDecoding bool `json:"allow_weak_decoding,omitempty" yaml:"allow_weak_decoding,omitempty"` // mode Mode MappingMode `json:"mode,omitempty" yaml:"mode,omitempty"` // Source attribute. // // Source path to the attribute(s) which should be copied to the authentication context. // Use '.' to copy everything. // Required for dynamic mode. // Example: access_token Source string `json:"source,omitempty" yaml:"source,omitempty"` // When static mode is used, this field contains a value that will be populated into a target attribute. Static interface{} `json:"static,omitempty" yaml:"static,omitempty"` // Target attribute. // // Target path in the authentication context where source attribute(s) should be pasted. // Use '.' to paste to the context top level object. // Example: . // Required: true Target string `json:"target" yaml:"target"` // Type of the target attribute // // The `type` parameter accepts the following values: // `number`, `string`, `bool`, `number_array`, `string_array`, `bool_array`, `any`. // Example: string // Required: true Type string `json:"type" yaml:"type"` }
Mapping Attribute mapping.
Source and target must be provided.
swagger:model Mapping
func (*Mapping) ContextValidate ¶
ContextValidate validate this mapping based on the context it is used
func (*Mapping) MarshalBinary ¶
MarshalBinary interface implementation
func (*Mapping) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type MappingMode ¶
type MappingMode string
MappingMode mapping mode
swagger:model MappingMode
func (MappingMode) ContextValidate ¶
ContextValidate validates this mapping mode based on context it is used
type Mappings ¶
type Mappings []*Mapping
Mappings An array of mappings
Mapping is used to unify attributes from external IDPs and propagate them to the authentication context to be used later on. By mapping your authentication context attributes, you unify attributes from all IDPs that your users authenticate with. It allows you to use a set of unified attributes throughout ACP for multiple purposes.
swagger:model Mappings
func (Mappings) ContextValidate ¶
ContextValidate validate this mappings based on the context it is used
type Metadata ¶
type Metadata map[string]interface{}
Metadata metadata
swagger:model Metadata
func (Metadata) ContextValidate ¶
ContextValidate validates this metadata based on context it is used
type Name ¶
type Name struct { // space Space string `json:"Space,omitempty" yaml:"Space,omitempty"` }
Name A Name represents an XML name (Local) annotated with a name space identifier (Space). In tokens returned by [Decoder.Token], the Space identifier is given as a canonical URL, not the short prefix used in the document being parsed.
swagger:model Name
func (*Name) ContextValidate ¶
ContextValidate validates this name based on context it is used
func (*Name) MarshalBinary ¶
MarshalBinary interface implementation
func (*Name) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type NameID ¶
type NameID struct { // format Format string `json:"Format,omitempty" yaml:"Format,omitempty"` // name qualifier NameQualifier string `json:"NameQualifier,omitempty" yaml:"NameQualifier,omitempty"` // s p name qualifier SPNameQualifier string `json:"SPNameQualifier,omitempty" yaml:"SPNameQualifier,omitempty"` // s p provided ID SPProvidedID string `json:"SPProvidedID,omitempty" yaml:"SPProvidedID,omitempty"` // value Value string `json:"Value,omitempty" yaml:"Value,omitempty"` }
NameID NameID represents the SAML element NameID.
See http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf §2.2.3
swagger:model NameID
func (*NameID) ContextValidate ¶
ContextValidate validates this name ID based on context it is used
func (*NameID) MarshalBinary ¶
MarshalBinary interface implementation
func (*NameID) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type NameIDFormat ¶
type NameIDFormat string
NameIDFormat NameIDFormat is the format of the id
swagger:model NameIDFormat
func (NameIDFormat) ContextValidate ¶
ContextValidate validates this name ID format based on context it is used
type OBBRConfiguration ¶
type OBBRConfiguration struct { // industry Industry OBBRIndustry `json:"industry,omitempty" yaml:"industry,omitempty"` }
OBBRConfiguration o b b r configuration
swagger:model OBBRConfiguration
func (*OBBRConfiguration) ContextValidate ¶
ContextValidate validate this o b b r configuration based on the context it is used
func (*OBBRConfiguration) MarshalBinary ¶
func (m *OBBRConfiguration) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OBBRConfiguration) UnmarshalBinary ¶
func (m *OBBRConfiguration) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type OBBRIndustry ¶
type OBBRIndustry string
OBBRIndustry o b b r industry
swagger:model OBBRIndustry
func (OBBRIndustry) ContextValidate ¶
ContextValidate validates this o b b r industry based on context it is used
type OBBRMetadata ¶
type OBBRMetadata struct { // An array of hosts subscribed to Open Finance Webhook Notifications WebhookUris []string `json:"webhook_uris" yaml:"webhook_uris"` }
OBBRMetadata o b b r metadata
swagger:model OBBRMetadata
func (*OBBRMetadata) ContextValidate ¶
ContextValidate validates this o b b r metadata based on context it is used
func (*OBBRMetadata) MarshalBinary ¶
func (m *OBBRMetadata) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OBBRMetadata) UnmarshalBinary ¶
func (m *OBBRMetadata) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type OIDCCredentials ¶
type OIDCCredentials struct { // OAuth client application secret ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"` // private key jwt PrivateKeyJwt *PrivateKeyJWTCredentials `json:"private_key_jwt,omitempty" yaml:"private_key_jwt,omitempty"` }
OIDCCredentials OIDC IDP specific credentials
swagger:model OIDCCredentials
func (*OIDCCredentials) ContextValidate ¶
ContextValidate validate this o ID c credentials based on the context it is used
func (*OIDCCredentials) MarshalBinary ¶
func (m *OIDCCredentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OIDCCredentials) UnmarshalBinary ¶
func (m *OIDCCredentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type OIDCIDP ¶
type OIDCIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // credentials Credentials *OIDCCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // settings Settings *OIDCSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
OIDCIDP o ID c ID p
swagger:model OIDCIDP
func (*OIDCIDP) ContextValidate ¶
ContextValidate validate this o ID c ID p based on the context it is used
func (*OIDCIDP) MarshalBinary ¶
MarshalBinary interface implementation
func (*OIDCIDP) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type OIDCServerConsent ¶
type OIDCServerConsent interface{}
OIDCServerConsent o ID c server consent
swagger:model OIDCServerConsent
type OIDCSettings ¶
type OIDCSettings struct { // Client authentication method // Enum: ["client_secret","private_key_jwt"] AuthenticationMethod string `json:"authentication_method,omitempty" yaml:"authentication_method,omitempty"` // OAuth client application identifier // Example: client ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // If enabled, users' data is collected by calling the `userinfo` endpoint. GetUserInfo bool `json:"get_user_info,omitempty" yaml:"get_user_info,omitempty"` // URL used to define the {baseURL} for any OpenID Connect endpoint when authorizing against ACP. IssuerURL string `json:"issuer_url,omitempty" yaml:"issuer_url,omitempty"` // An array of additional scopes your client requests // Example: ["email","profile","openid"] Scopes []string `json:"scopes" yaml:"scopes"` // Whether to send the identifier as a `login_hint` parameter to the IDP SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"` }
OIDCSettings OIDC IDP specific settings
swagger:model OIDCSettings
func (*OIDCSettings) ContextValidate ¶
ContextValidate validates this o ID c settings based on context it is used
func (*OIDCSettings) MarshalBinary ¶
func (m *OIDCSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OIDCSettings) UnmarshalBinary ¶
func (m *OIDCSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type OTPConfiguration ¶
type OTPConfiguration struct { // The maximum time one-time code is valid. // Example: 5m // Required: true // Format: duration Expiration strfmt.Duration `json:"expiration" yaml:"expiration"` // The number of characters for one-time code. // Example: 6 // Required: true // Maximum: 10 // Minimum: 4 Length int64 `json:"length" yaml:"length"` }
OTPConfiguration o t p configuration
swagger:model OTPConfiguration
func (*OTPConfiguration) ContextValidate ¶
ContextValidate validates this o t p configuration based on context it is used
func (*OTPConfiguration) MarshalBinary ¶
func (m *OTPConfiguration) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OTPConfiguration) UnmarshalBinary ¶
func (m *OTPConfiguration) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type OTPPayload ¶
type OTPPayload struct { // address Address string `json:"address,omitempty" yaml:"address,omitempty"` // failure reason FailureReason string `json:"failure_reason,omitempty" yaml:"failure_reason,omitempty"` // otp id OtpID string `json:"otp_id,omitempty" yaml:"otp_id,omitempty"` // purpose Purpose string `json:"purpose,omitempty" yaml:"purpose,omitempty"` // type // Enum: ["sms","email"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // user id UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"` }
OTPPayload o t p payload
swagger:model OTPPayload
func (*OTPPayload) ContextValidate ¶
ContextValidate validates this o t p payload based on context it is used
func (*OTPPayload) MarshalBinary ¶
func (m *OTPPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OTPPayload) UnmarshalBinary ¶
func (m *OTPPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type OktaCredentials ¶
type OktaCredentials struct { // supervisor client SupervisorClient *OktaSupervisorClient `json:"supervisor_client,omitempty" yaml:"supervisor_client,omitempty"` }
OktaCredentials Okta IDP specific credentials
swagger:model OktaCredentials
func (*OktaCredentials) ContextValidate ¶
ContextValidate validate this okta credentials based on the context it is used
func (*OktaCredentials) MarshalBinary ¶
func (m *OktaCredentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OktaCredentials) UnmarshalBinary ¶
func (m *OktaCredentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type OktaIDP ¶
type OktaIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // credentials Credentials *OktaCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // settings Settings *OktaSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
OktaIDP okta ID p
swagger:model OktaIDP
func (*OktaIDP) ContextValidate ¶
ContextValidate validate this okta ID p based on the context it is used
func (*OktaIDP) MarshalBinary ¶
MarshalBinary interface implementation
func (*OktaIDP) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type OktaSettings ¶
type OktaSettings struct { // ID of a custom authorization server // // If the `use_org_authorization_server` parameter is set to `false`, use this field to specify // the ID of a custom authorization server. // // If not provided, the `default` value is used. AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // String represented domain of the Okta Authentication Service for your organization // Example: dev-316761.okta.com Domain string `json:"domain,omitempty" yaml:"domain,omitempty"` // If enabled, users' data is collected by calling the `userinfo` endpoint. GetUserInfo bool `json:"get_user_info,omitempty" yaml:"get_user_info,omitempty"` // An array of additional scopes your client requests Scopes []string `json:"scopes" yaml:"scopes"` // Whether to send the identifier as a `login_hint` parameter to the IDP SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"` // If set to `true`, the built-in authorization server is used UseOrgAuthorizationServer bool `json:"use_org_authorization_server,omitempty" yaml:"use_org_authorization_server,omitempty"` }
OktaSettings Okta IDP specific settings
swagger:model OktaSettings
func (*OktaSettings) ContextValidate ¶
ContextValidate validates this okta settings based on context it is used
func (*OktaSettings) MarshalBinary ¶
func (m *OktaSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OktaSettings) UnmarshalBinary ¶
func (m *OktaSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type OktaSupervisorClient ¶
type OktaSupervisorClient struct { // client id ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // client private key PrivateKey string `json:"private_key,omitempty" yaml:"private_key,omitempty"` }
OktaSupervisorClient The `supervisor_client` parameter holds credentials for Okta's OAuth client application that are used to authorize to Okta to be able to create new client applications.
swagger:model OktaSupervisorClient
func (*OktaSupervisorClient) ContextValidate ¶
ContextValidate validates this okta supervisor client based on context it is used
func (*OktaSupervisorClient) MarshalBinary ¶
func (m *OktaSupervisorClient) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OktaSupervisorClient) UnmarshalBinary ¶
func (m *OktaSupervisorClient) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type OpenbankingServerConsent ¶
type OpenbankingServerConsent struct { // If empty it defaults to demo bank embedded in acp BankURL string `json:"bank_url,omitempty" yaml:"bank_url,omitempty"` }
OpenbankingServerConsent openbanking server consent
swagger:model OpenbankingServerConsent
func (*OpenbankingServerConsent) ContextValidate ¶
func (m *OpenbankingServerConsent) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this openbanking server consent based on context it is used
func (*OpenbankingServerConsent) MarshalBinary ¶
func (m *OpenbankingServerConsent) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OpenbankingServerConsent) UnmarshalBinary ¶
func (m *OpenbankingServerConsent) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Org ¶
type Org struct { // allowed authentication mechanisms AuthenticationMechanisms []string `json:"authentication_mechanisms" yaml:"authentication_mechanisms"` // Your organization's label color in a HEX format. // Example: #007FFF Color string `json:"color,omitempty" yaml:"color,omitempty"` // Display description of the organization // Example: Organization description Description string `json:"description,omitempty" yaml:"description,omitempty"` // An array of email domains configured for an organization for the purposes of IDP discovery Domains []string `json:"domains" yaml:"domains"` // Unique identifier of an organization // // If not provided, a random ID is generated. // Example: default ID string `json:"id,omitempty" yaml:"id,omitempty"` // metadata Metadata *ServerMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // Display name of the organization // Example: default Name string `json:"name,omitempty" yaml:"name,omitempty"` // The id of the parent workspace / organization ParentID string `json:"parent_id,omitempty" yaml:"parent_id,omitempty"` // If true this organization can be used as a template when creating a new ones. Template bool `json:"template,omitempty" yaml:"template,omitempty"` }
Org org
swagger:model Org
func (*Org) ContextValidate ¶
ContextValidate validate this org based on the context it is used
func (*Org) MarshalBinary ¶
MarshalBinary interface implementation
func (*Org) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type Organization ¶
type Organization struct { // organization display names OrganizationDisplayNames []*LocalizedName `json:"OrganizationDisplayNames" yaml:"OrganizationDisplayNames"` // organization names OrganizationNames []*LocalizedName `json:"OrganizationNames" yaml:"OrganizationNames"` // organization u r ls OrganizationURLs []*LocalizedURI `json:"OrganizationURLs" yaml:"OrganizationURLs"` }
Organization Organization represents the SAML Organization object.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.3.2.1
swagger:model Organization
func (*Organization) ContextValidate ¶
ContextValidate validate this organization based on the context it is used
func (*Organization) MarshalBinary ¶
func (m *Organization) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*Organization) UnmarshalBinary ¶
func (m *Organization) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type OrganizationConfiguration ¶
type OrganizationConfiguration struct { // An array of email domains configured for an organization for the purposes of IDP discovery Domains []string `json:"domains" yaml:"domains"` }
OrganizationConfiguration organization configuration
swagger:model OrganizationConfiguration
func (*OrganizationConfiguration) ContextValidate ¶
func (m *OrganizationConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this organization configuration based on context it is used
func (*OrganizationConfiguration) MarshalBinary ¶
func (m *OrganizationConfiguration) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OrganizationConfiguration) UnmarshalBinary ¶
func (m *OrganizationConfiguration) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type OrganizationIDP ¶
type OrganizationIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
OrganizationIDP organization ID p
swagger:model OrganizationIDP
func (*OrganizationIDP) ContextValidate ¶
ContextValidate validate this organization ID p based on the context it is used
func (*OrganizationIDP) MarshalBinary ¶
func (m *OrganizationIDP) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OrganizationIDP) UnmarshalBinary ¶
func (m *OrganizationIDP) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type OrganizationMetadata ¶
type OrganizationMetadata struct { // payload Payload map[string]interface{} `json:"payload,omitempty" yaml:"payload,omitempty"` }
OrganizationMetadata organization metadata
swagger:model OrganizationMetadata
func (*OrganizationMetadata) ContextValidate ¶
ContextValidate validates this organization metadata based on context it is used
func (*OrganizationMetadata) MarshalBinary ¶
func (m *OrganizationMetadata) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OrganizationMetadata) UnmarshalBinary ¶
func (m *OrganizationMetadata) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type OrganizationResponse ¶
type OrganizationResponse struct { // allowed authentication mechanisms AuthenticationMechanisms []string `json:"authentication_mechanisms" yaml:"authentication_mechanisms"` // Your organization's label color in a HEX format. // Example: #007FFF Color string `json:"color,omitempty" yaml:"color,omitempty"` // Display description of the organization // Example: Organization description Description string `json:"description,omitempty" yaml:"description,omitempty"` // An array of email domains configured for an organization for the purposes of IDP discovery Domains []string `json:"domains" yaml:"domains"` // Unique identifier of an organization // // If not provided, a random ID is generated. // Example: default ID string `json:"id,omitempty" yaml:"id,omitempty"` // issuer url IssuerURL string `json:"issuer_url,omitempty" yaml:"issuer_url,omitempty"` // metadata Metadata *ServerMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // Display name of the organization // Example: default Name string `json:"name,omitempty" yaml:"name,omitempty"` // number of child organizations NumberOfChildOrganizations int64 `json:"number_of_child_organizations,omitempty" yaml:"number_of_child_organizations,omitempty"` // The id of the parent workspace / organization ParentID string `json:"parent_id,omitempty" yaml:"parent_id,omitempty"` // subject format // Enum: ["hash","legacy"] SubjectFormat string `json:"subject_format,omitempty" yaml:"subject_format,omitempty"` // subject identifier algorithm salt SubjectIdentifierAlgorithmSalt string `json:"subject_identifier_algorithm_salt,omitempty" yaml:"subject_identifier_algorithm_salt,omitempty"` // If true this organization can be used as a template when creating a new ones. Template bool `json:"template,omitempty" yaml:"template,omitempty"` // theme id ThemeID string `json:"theme_id,omitempty" yaml:"theme_id,omitempty"` }
OrganizationResponse organization response
swagger:model OrganizationResponse
func (*OrganizationResponse) ContextValidate ¶
ContextValidate validate this organization response based on the context it is used
func (*OrganizationResponse) MarshalBinary ¶
func (m *OrganizationResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OrganizationResponse) UnmarshalBinary ¶
func (m *OrganizationResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type OrganizationsResponse ¶
type OrganizationsResponse struct { // organizations Organizations []*OrganizationResponse `json:"organizations" yaml:"organizations"` }
OrganizationsResponse organizations response
swagger:model OrganizationsResponse
func (*OrganizationsResponse) ContextValidate ¶
ContextValidate validate this organizations response based on the context it is used
func (*OrganizationsResponse) MarshalBinary ¶
func (m *OrganizationsResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*OrganizationsResponse) UnmarshalBinary ¶
func (m *OrganizationsResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PDPDescriptor ¶
type PDPDescriptor struct { // assertion ID request services AssertionIDRequestServices []*Endpoint `json:"AssertionIDRequestServices" yaml:"AssertionIDRequestServices"` // authz services AuthzServices []*Endpoint `json:"AuthzServices" yaml:"AuthzServices"` // cache duration CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"` // contact people ContactPeople []*ContactPerson `json:"ContactPeople" yaml:"ContactPeople"` // error URL ErrorURL string `json:"ErrorURL,omitempty" yaml:"ErrorURL,omitempty"` // ID ID string `json:"ID,omitempty" yaml:"ID,omitempty"` // key descriptors KeyDescriptors []*KeyDescriptor `json:"KeyDescriptors" yaml:"KeyDescriptors"` // name ID formats NameIDFormats []NameIDFormat `json:"NameIDFormats" yaml:"NameIDFormats"` // organization Organization *Organization `json:"Organization,omitempty" yaml:"Organization,omitempty"` // protocol support enumeration ProtocolSupportEnumeration string `json:"ProtocolSupportEnumeration,omitempty" yaml:"ProtocolSupportEnumeration,omitempty"` // signature Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"` // valid until // Format: date-time ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"` }
PDPDescriptor PDPDescriptor represents the SAML PDPDescriptor object.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.6
swagger:model PDPDescriptor
func (*PDPDescriptor) ContextValidate ¶
ContextValidate validate this p d p descriptor based on the context it is used
func (*PDPDescriptor) MarshalBinary ¶
func (m *PDPDescriptor) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PDPDescriptor) UnmarshalBinary ¶
func (m *PDPDescriptor) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PIICategory ¶
type PIICategory struct { // name // Example: HIPAA Name string `json:"name,omitempty" yaml:"name,omitempty"` }
PIICategory p i i category
swagger:model PIICategory
func (*PIICategory) ContextValidate ¶
ContextValidate validates this p i i category based on context it is used
func (*PIICategory) MarshalBinary ¶
func (m *PIICategory) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PIICategory) UnmarshalBinary ¶
func (m *PIICategory) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PayloadSettings ¶
type PayloadSettings struct { // payload format // Enum: ["json","jws"] Format string `json:"format,omitempty" yaml:"format,omitempty"` // jws payload JwsPayload *JWSPayloadSettings `json:"jws_payload,omitempty" yaml:"jws_payload,omitempty"` }
PayloadSettings payload settings
swagger:model PayloadSettings
func (*PayloadSettings) ContextValidate ¶
ContextValidate validate this payload settings based on the context it is used
func (*PayloadSettings) MarshalBinary ¶
func (m *PayloadSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PayloadSettings) UnmarshalBinary ¶
func (m *PayloadSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PersonalDetails ¶
type PersonalDetails struct { // user id UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"` }
PersonalDetails personal details
swagger:model PersonalDetails
func (*PersonalDetails) ContextValidate ¶
ContextValidate validates this personal details based on context it is used
func (*PersonalDetails) MarshalBinary ¶
func (m *PersonalDetails) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PersonalDetails) UnmarshalBinary ¶
func (m *PersonalDetails) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Policies ¶
type Policies struct { // list of policies Policies []*Policy `json:"policies" yaml:"policies"` }
Policies policies
swagger:model Policies
func (*Policies) ContextValidate ¶
ContextValidate validate this policies based on the context it is used
func (*Policies) MarshalBinary ¶
MarshalBinary interface implementation
func (*Policies) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type Policy ¶
type Policy struct { // The definition of an Open Policy Agent (OPA) policy provided using the REGO language. Definition string `json:"definition,omitempty" yaml:"definition,omitempty"` // env version EnvVersion FnEnvVersion `json:"env_version,omitempty" yaml:"env_version,omitempty"` // Unique ID of your policy // Example: 1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // Language of a policy // // ACP supports creating Cloudentity policies (using a visual editor or defined using JSON or // YAML) and policies defined using REGO (language used by Open Policy Agent (OPA)). // Example: cloudentity Language string `json:"language,omitempty" yaml:"language,omitempty"` // Display name for your policy // Example: check_consent PolicyName string `json:"policy_name,omitempty" yaml:"policy_name,omitempty"` // ID of your authorization server (workspace) // Example: default ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // ID of your tenant // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // Define a type of your policy // // ACP is provided with the following policy types: user, developer, machine, dcr, api. // // Depending on the policy type the policy can be assigned to different policy // execution points. // // A policy of the `user` type can be assigned only to the following scopes: `scope_user_grant`, // `server_user_token`, `client_user_token`. // // A `developer` policy can be assigned only to the `scope_client_assignment` and // `server_client_assignment` scopes. // // A policy of the `machine` type can be assigned only to the following scopes: // `scope_machine_grant`, `server_machine_token`, `client_machine_token`. // // A `dcr` policy can be assigned only to the `scope_dynamic_client_registration` and the // `server_dynamic_client_registration` scopes. // // An `api` policy can be assigned to all of the policy execution points. // // Each of the policies type has its defined and provided out of the box policy validators. // Example: user Type string `json:"type,omitempty" yaml:"type,omitempty"` // An array of validators for a Cloudentity policy Validators []*ValidatorConfig `json:"validators" yaml:"validators"` }
Policy policy
swagger:model Policy
func (*Policy) ContextValidate ¶
ContextValidate validate this policy based on the context it is used
func (*Policy) MarshalBinary ¶
MarshalBinary interface implementation
func (*Policy) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type PolicyEvaluatedPayload ¶
type PolicyEvaluatedPayload struct { // Policy output Output map[string]string `json:"output,omitempty" yaml:"output,omitempty"` // policy Policy *PolicyPayload `json:"policy,omitempty" yaml:"policy,omitempty"` // An array of recovery methods that take place when a policy validation fails. Recovery []interface{} `json:"recovery" yaml:"recovery"` // The result of policy validation. Result string `json:"result,omitempty" yaml:"result,omitempty"` }
PolicyEvaluatedPayload policy evaluated payload
swagger:model PolicyEvaluatedPayload
func (*PolicyEvaluatedPayload) ContextValidate ¶
func (m *PolicyEvaluatedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this policy evaluated payload based on the context it is used
func (*PolicyEvaluatedPayload) MarshalBinary ¶
func (m *PolicyEvaluatedPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PolicyEvaluatedPayload) UnmarshalBinary ¶
func (m *PolicyEvaluatedPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PolicyExecutionPoint ¶
type PolicyExecutionPoint struct { // Optional policy ID // Example: 1 PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"` // The ID of your authorization server (workspace) // Example: default ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // String representation of the target's ID // Example: 1 TargetFk string `json:"target_fk,omitempty" yaml:"target_fk,omitempty"` // The ID of your tenant // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // String representation of the policy execution point type // // Policies can be assigned to different policy execution points. For example, you can create a // policy that you want to trigger while calls are made to your APIs. In this // case, the type of the policy execution point is `api`. While // choosing the policies that are applied for API calls, only those with the // `api` type are available. // Example: scope_client_assignment Type string `json:"type,omitempty" yaml:"type,omitempty"` }
PolicyExecutionPoint policy execution point
swagger:model PolicyExecutionPoint
func (*PolicyExecutionPoint) ContextValidate ¶
ContextValidate validates this policy execution point based on context it is used
func (*PolicyExecutionPoint) MarshalBinary ¶
func (m *PolicyExecutionPoint) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PolicyExecutionPoint) UnmarshalBinary ¶
func (m *PolicyExecutionPoint) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PolicyExecutionPoints ¶
type PolicyExecutionPoints struct { // list of policy executions ExecutionPoints []*PolicyExecutionPoint `json:"execution_points" yaml:"execution_points"` }
PolicyExecutionPoints policy execution points
swagger:model PolicyExecutionPoints
func (*PolicyExecutionPoints) ContextValidate ¶
ContextValidate validate this policy execution points based on the context it is used
func (*PolicyExecutionPoints) MarshalBinary ¶
func (m *PolicyExecutionPoints) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PolicyExecutionPoints) UnmarshalBinary ¶
func (m *PolicyExecutionPoints) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PolicyPayload ¶
type PolicyPayload struct { // String representation of the policy execution point type ExecutionPointType string `json:"execution_point_type,omitempty" yaml:"execution_point_type,omitempty"` // Unique key, derived from execution point, of protected resource where the policy is assigned. // // Example key for policy in default tenant, default server protecting scope email for machine access. // default/default/scope/email/machine Key string `json:"key,omitempty" yaml:"key,omitempty"` // Policy id PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"` // Define a type of your policy // // ACP is provided with the following policy types: user, developer, machine, dcr, api. Type string `json:"type,omitempty" yaml:"type,omitempty"` }
PolicyPayload policy payload
swagger:model PolicyPayload
func (*PolicyPayload) ContextValidate ¶
ContextValidate validates this policy payload based on context it is used
func (*PolicyPayload) MarshalBinary ¶
func (m *PolicyPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PolicyPayload) UnmarshalBinary ¶
func (m *PolicyPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PolicyValidationFailure ¶
type PolicyValidationFailure struct { // Details on the failed validation for a policy Details string `json:"details,omitempty" yaml:"details,omitempty"` // Message displayed for failed validation Message string `json:"message,omitempty" yaml:"message,omitempty"` // String representation of the validator for which the policy failed validation Validator string `json:"validator,omitempty" yaml:"validator,omitempty"` }
PolicyValidationFailure Defines the failure that took place for a policy validation
swagger:model PolicyValidationFailure
func (*PolicyValidationFailure) ContextValidate ¶
func (m *PolicyValidationFailure) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this policy validation failure based on context it is used
func (*PolicyValidationFailure) MarshalBinary ¶
func (m *PolicyValidationFailure) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PolicyValidationFailure) UnmarshalBinary ¶
func (m *PolicyValidationFailure) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PolicyValidationRecovery ¶
type PolicyValidationRecovery struct { // id ID string `json:"id,omitempty" yaml:"id,omitempty"` // type Type string `json:"type,omitempty" yaml:"type,omitempty"` }
PolicyValidationRecovery policy validation recovery
swagger:model PolicyValidationRecovery
func (*PolicyValidationRecovery) ContextValidate ¶
func (m *PolicyValidationRecovery) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this policy validation recovery based on context it is used
func (*PolicyValidationRecovery) MarshalBinary ¶
func (m *PolicyValidationRecovery) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PolicyValidationRecovery) UnmarshalBinary ¶
func (m *PolicyValidationRecovery) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PolicyValidationResult ¶
type PolicyValidationResult struct { // An array of failures that took place during the policy validation process Failure []*PolicyValidationFailure `json:"failure" yaml:"failure"` // An array of recovery methods that take place when a policy validation fails Recovery []*PolicyValidationRecovery `json:"recovery" yaml:"recovery"` // String representation of the policy validation result Result string `json:"result,omitempty" yaml:"result,omitempty"` }
PolicyValidationResult Provides information on the results of a policy validation
swagger:model PolicyValidationResult
func (*PolicyValidationResult) ContextValidate ¶
func (m *PolicyValidationResult) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this policy validation result based on the context it is used
func (*PolicyValidationResult) MarshalBinary ¶
func (m *PolicyValidationResult) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PolicyValidationResult) UnmarshalBinary ¶
func (m *PolicyValidationResult) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PoolAuditPayload ¶
type PoolAuditPayload struct { // authentication mechanisms AuthenticationMechanisms AuthenticationMechanisms `json:"authentication_mechanisms,omitempty" yaml:"authentication_mechanisms,omitempty"` // description Description string `json:"description,omitempty" yaml:"description,omitempty"` // name Name string `json:"name,omitempty" yaml:"name,omitempty"` // pool id PoolID string `json:"pool_id,omitempty" yaml:"pool_id,omitempty"` // public registration allowed PublicRegistrationAllowed bool `json:"public_registration_allowed,omitempty" yaml:"public_registration_allowed,omitempty"` }
PoolAuditPayload pool audit payload
swagger:model PoolAuditPayload
func (*PoolAuditPayload) ContextValidate ¶
ContextValidate validate this pool audit payload based on the context it is used
func (*PoolAuditPayload) MarshalBinary ¶
func (m *PoolAuditPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PoolAuditPayload) UnmarshalBinary ¶
func (m *PoolAuditPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PrivacyLedgerEvent ¶
type PrivacyLedgerEvent struct { // date // Format: date-time Date strfmt.DateTime `json:"date,omitempty" yaml:"date,omitempty"` // id ID string `json:"id,omitempty" yaml:"id,omitempty"` // payload Payload *PrivacyLedgerPayload `json:"payload,omitempty" yaml:"payload,omitempty"` // payload signature PayloadSignature string `json:"payload_signature,omitempty" yaml:"payload_signature,omitempty"` // subject Subject string `json:"subject,omitempty" yaml:"subject,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` }
PrivacyLedgerEvent privacy ledger event
swagger:model PrivacyLedgerEvent
func (*PrivacyLedgerEvent) ContextValidate ¶
ContextValidate validate this privacy ledger event based on the context it is used
func (*PrivacyLedgerEvent) MarshalBinary ¶
func (m *PrivacyLedgerEvent) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PrivacyLedgerEvent) UnmarshalBinary ¶
func (m *PrivacyLedgerEvent) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PrivacyLedgerEventType ¶
type PrivacyLedgerEventType string
PrivacyLedgerEventType privacy ledger event type
swagger:model PrivacyLedgerEventType
func (PrivacyLedgerEventType) ContextValidate ¶
ContextValidate validates this privacy ledger event type based on context it is used
type PrivacyLedgerEvents ¶
type PrivacyLedgerEvents struct { // events Events []*PrivacyLedgerEvent `json:"events" yaml:"events"` }
PrivacyLedgerEvents privacy ledger events
swagger:model PrivacyLedgerEvents
func (*PrivacyLedgerEvents) ContextValidate ¶
ContextValidate validate this privacy ledger events based on the context it is used
func (*PrivacyLedgerEvents) MarshalBinary ¶
func (m *PrivacyLedgerEvents) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PrivacyLedgerEvents) UnmarshalBinary ¶
func (m *PrivacyLedgerEvents) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PrivacyLedgerPayload ¶
type PrivacyLedgerPayload struct { // consent granted ConsentGranted *ConsentGrantedEvent `json:"consent_granted,omitempty" yaml:"consent_granted,omitempty"` // consent revoked ConsentRevoked *ConsentRevokedEvent `json:"consent_revoked,omitempty" yaml:"consent_revoked,omitempty"` // event type EventType PrivacyLedgerEventType `json:"event_type,omitempty" yaml:"event_type,omitempty"` }
PrivacyLedgerPayload privacy ledger payload
swagger:model PrivacyLedgerPayload
func (*PrivacyLedgerPayload) ContextValidate ¶
ContextValidate validate this privacy ledger payload based on the context it is used
func (*PrivacyLedgerPayload) MarshalBinary ¶
func (m *PrivacyLedgerPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PrivacyLedgerPayload) UnmarshalBinary ¶
func (m *PrivacyLedgerPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type PrivateKeyJWTCredentials ¶
type PrivateKeyJWTCredentials struct { // Algorithm used to sign the client_assertion (see JWS) - default RS256 Algorithm string `json:"algorithm,omitempty" yaml:"algorithm,omitempty"` // ExpiresIn defines how long client_assertion is valid for - default 30 seconds // Format: duration Exp strfmt.Duration `json:"exp,omitempty" yaml:"exp,omitempty"` // Key is a PEM formatted private key used to sign client_assertion Key string `json:"key,omitempty" yaml:"key,omitempty"` }
PrivateKeyJWTCredentials PrivateKeyJWT authentication settings
swagger:model PrivateKeyJWTCredentials
func (*PrivateKeyJWTCredentials) ContextValidate ¶
func (m *PrivateKeyJWTCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this private key j w t credentials based on context it is used
func (*PrivateKeyJWTCredentials) MarshalBinary ¶
func (m *PrivateKeyJWTCredentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*PrivateKeyJWTCredentials) UnmarshalBinary ¶
func (m *PrivateKeyJWTCredentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ProtectedType ¶
type ProtectedType string
ProtectedType protected type
swagger:model ProtectedType
func (ProtectedType) ContextValidate ¶
ContextValidate validates this protected type based on context it is used
type ProvisioningMode ¶
type ProvisioningMode string
ProvisioningMode provisioning mode
swagger:model ProvisioningMode
func (ProvisioningMode) ContextValidate ¶
ContextValidate validates this provisioning mode based on context it is used
type Purpose ¶
type Purpose struct { // name // Example: Core Function Name string `json:"name,omitempty" yaml:"name,omitempty"` // is the purpose primary. If there are multiple purposes defined, one of them must be marked as primary. // Example: true Primary bool `json:"primary,omitempty" yaml:"primary,omitempty"` }
Purpose purpose
swagger:model Purpose
func (*Purpose) ContextValidate ¶
ContextValidate validates this purpose based on context it is used
func (*Purpose) MarshalBinary ¶
MarshalBinary interface implementation
func (*Purpose) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type RecentActivities ¶
type RecentActivities struct { // activities Activities []*RecentActivity `json:"activities" yaml:"activities"` }
RecentActivities recent activities
swagger:model RecentActivities
func (*RecentActivities) ContextValidate ¶
ContextValidate validate this recent activities based on the context it is used
func (*RecentActivities) MarshalBinary ¶
func (m *RecentActivities) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RecentActivities) UnmarshalBinary ¶
func (m *RecentActivities) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RecentActivity ¶
type RecentActivity struct { // date // Format: date-time Date strfmt.DateTime `json:"date,omitempty" yaml:"date,omitempty"` // id ID string `json:"id,omitempty" yaml:"id,omitempty"` // payload Payload *RecentActivityPayload `json:"payload,omitempty" yaml:"payload,omitempty"` // server id ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` }
RecentActivity recent activity
swagger:model RecentActivity
func (*RecentActivity) ContextValidate ¶
ContextValidate validate this recent activity based on the context it is used
func (*RecentActivity) MarshalBinary ¶
func (m *RecentActivity) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RecentActivity) UnmarshalBinary ¶
func (m *RecentActivity) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RecentActivityPayload ¶
type RecentActivityPayload struct { // action Action string `json:"action,omitempty" yaml:"action,omitempty"` // count Count int64 `json:"count,omitempty" yaml:"count,omitempty"` // primary name PrimaryName string `json:"primary_name,omitempty" yaml:"primary_name,omitempty"` // secondary name SecondaryName string `json:"secondary_name,omitempty" yaml:"secondary_name,omitempty"` // subject Subject string `json:"subject,omitempty" yaml:"subject,omitempty"` // subject id SubjectID string `json:"subject_id,omitempty" yaml:"subject_id,omitempty"` }
RecentActivityPayload recent activity payload
swagger:model RecentActivityPayload
func (*RecentActivityPayload) ContextValidate ¶
ContextValidate validates this recent activity payload based on context it is used
func (*RecentActivityPayload) MarshalBinary ¶
func (m *RecentActivityPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RecentActivityPayload) UnmarshalBinary ¶
func (m *RecentActivityPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RecoveryConfig ¶
type RecoveryConfig struct { // type Type string `json:"type,omitempty" yaml:"type,omitempty"` }
RecoveryConfig recovery config
swagger:model RecoveryConfig
func (*RecoveryConfig) ContextValidate ¶
ContextValidate validates this recovery config based on context it is used
func (*RecoveryConfig) MarshalBinary ¶
func (m *RecoveryConfig) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RecoveryConfig) UnmarshalBinary ¶
func (m *RecoveryConfig) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RecoveryPayload ¶
type RecoveryPayload struct { // amr Amr []string `json:"amr" yaml:"amr"` // recovery methods RecoveryMethods []interface{} `json:"recovery_methods" yaml:"recovery_methods"` // recovery steps RecoverySteps []interface{} `json:"recovery_steps" yaml:"recovery_steps"` }
RecoveryPayload recovery payload
swagger:model RecoveryPayload
func (*RecoveryPayload) ContextValidate ¶
ContextValidate validates this recovery payload based on context it is used
func (*RecoveryPayload) MarshalBinary ¶
func (m *RecoveryPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RecoveryPayload) UnmarshalBinary ¶
func (m *RecoveryPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RedirectURIs ¶
type RedirectURIs []string
RedirectURIs OAuth-allowed redirect URIs
Cloudentity uses redirect URIs to redirect users back to the application after they authorized the application. Along with the redirection, an authorization code or access token is added to the URL.
For backward compatibility reasons, it's also acceptable to pass `redirect_uris` as a string, for example: https://example.com/callback.
example: ["https://example.com/callback"]
swagger:model RedirectURIs
func (RedirectURIs) ContextValidate ¶
ContextValidate validates this redirect u r is based on context it is used
type RegistrationToken ¶
type RegistrationToken struct { // client uri ClientURI string `json:"client_uri,omitempty" yaml:"client_uri,omitempty"` // expires in ExpiresIn int64 `json:"expires_in,omitempty" yaml:"expires_in,omitempty"` // signature Signature string `json:"signature,omitempty" yaml:"signature,omitempty"` }
RegistrationToken registration token
swagger:model RegistrationToken
func (*RegistrationToken) ContextValidate ¶
ContextValidate validates this registration token based on context it is used
func (*RegistrationToken) MarshalBinary ¶
func (m *RegistrationToken) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RegistrationToken) UnmarshalBinary ¶
func (m *RegistrationToken) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RegistryReference ¶
type RegistryReference struct { // An identifier of the intermediary that can be looked up from a legal identity registry source. RegisteredEntityID string `json:"registered_entity_id,omitempty" yaml:"registered_entity_id,omitempty"` // The legal company name for the intermediary. RegisteredEntityName string `json:"registered_entity_name,omitempty" yaml:"registered_entity_name,omitempty"` // registry Registry string `json:"registry,omitempty" yaml:"registry,omitempty"` }
RegistryReference Used for registry references. In snake case to match IETF RFC 7591 naming formats
swagger:model RegistryReference
func (*RegistryReference) ContextValidate ¶
ContextValidate validates this registry reference based on context it is used
func (*RegistryReference) MarshalBinary ¶
func (m *RegistryReference) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RegistryReference) UnmarshalBinary ¶
func (m *RegistryReference) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RemoveServiceConfigurationResult ¶
type RemoveServiceConfigurationResult struct { // not removed policies NotRemovedPolicies []*Policy `json:"not_removed_policies" yaml:"not_removed_policies"` // removed apis RemovedApis []*API `json:"removed_apis" yaml:"removed_apis"` // removed policies RemovedPolicies []*Policy `json:"removed_policies" yaml:"removed_policies"` }
RemoveServiceConfigurationResult remove service configuration result
swagger:model RemoveServiceConfigurationResult
func (*RemoveServiceConfigurationResult) ContextValidate ¶
func (m *RemoveServiceConfigurationResult) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this remove service configuration result based on the context it is used
func (*RemoveServiceConfigurationResult) MarshalBinary ¶
func (m *RemoveServiceConfigurationResult) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RemoveServiceConfigurationResult) UnmarshalBinary ¶
func (m *RemoveServiceConfigurationResult) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RequestValidatedData ¶
type RequestValidatedData struct { // anonymous Anonymous bool `json:"anonymous,omitempty" yaml:"anonymous,omitempty"` // api API *API `json:"api,omitempty" yaml:"api,omitempty"` // claims Claims JwtClaims `json:"claims,omitempty" yaml:"claims,omitempty"` // duration ms DurationMs int64 `json:"duration_ms,omitempty" yaml:"duration_ms,omitempty"` // gateway Gateway *Gateway `json:"gateway,omitempty" yaml:"gateway,omitempty"` // invalid token InvalidToken bool `json:"invalid_token,omitempty" yaml:"invalid_token,omitempty"` // output Output map[string]string `json:"output,omitempty" yaml:"output,omitempty"` // result Result *PolicyValidationResult `json:"result,omitempty" yaml:"result,omitempty"` // service Service *Service `json:"service,omitempty" yaml:"service,omitempty"` }
RequestValidatedData request validated data
swagger:model RequestValidatedData
func (*RequestValidatedData) ContextValidate ¶
ContextValidate validate this request validated data based on the context it is used
func (*RequestValidatedData) MarshalBinary ¶
func (m *RequestValidatedData) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RequestValidatedData) UnmarshalBinary ¶
func (m *RequestValidatedData) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RequestValidatedPayload ¶
type RequestValidatedPayload struct { // access request data AccessRequestData *AccessRequestData `json:"access_request_data,omitempty" yaml:"access_request_data,omitempty"` // request validated data RequestValidatedData *RequestValidatedData `json:"request_validated_data,omitempty" yaml:"request_validated_data,omitempty"` }
RequestValidatedPayload request validated payload
swagger:model RequestValidatedPayload
func (*RequestValidatedPayload) ContextValidate ¶
func (m *RequestValidatedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this request validated payload based on the context it is used
func (*RequestValidatedPayload) MarshalBinary ¶
func (m *RequestValidatedPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RequestValidatedPayload) UnmarshalBinary ¶
func (m *RequestValidatedPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RequestedAttribute ¶
type RequestedAttribute struct { // friendly name FriendlyName string `json:"FriendlyName,omitempty" yaml:"FriendlyName,omitempty"` // is required IsRequired bool `json:"IsRequired,omitempty" yaml:"IsRequired,omitempty"` // name Name string `json:"Name,omitempty" yaml:"Name,omitempty"` // name format NameFormat string `json:"NameFormat,omitempty" yaml:"NameFormat,omitempty"` // values Values []*AttributeValue `json:"Values" yaml:"Values"` }
RequestedAttribute RequestedAttribute represents the SAML RequestedAttribute object.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.4.2
swagger:model RequestedAttribute
func (*RequestedAttribute) ContextValidate ¶
ContextValidate validate this requested attribute based on the context it is used
func (*RequestedAttribute) MarshalBinary ¶
func (m *RequestedAttribute) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RequestedAttribute) UnmarshalBinary ¶
func (m *RequestedAttribute) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ResponseModes ¶
type ResponseModes []string
ResponseModes response modes
swagger:model ResponseModes
func (ResponseModes) ContextValidate ¶
ContextValidate validates this response modes based on context it is used
type ResponseTypes ¶
type ResponseTypes []string
ResponseTypes An array of allowed response types
The array may consist of the following arguments:
`code` - when supplied as the value for the `response_type` parameter, a successful response includes an authorization code
`code token` - when supplied as the value for the `response_type` parameter, a successful response includes an access token, an access token type, and an authorization code
`id_token token` - when supplied as the value for the `response_type` parameter, a successful response includes an access token, an access token type, and an ID token
`code id_token token` - when supplied as the value for the `response_type` parameter, a successful response includes an authorization code, an ID token, an access token, and an access token type.
`token` - when supplied as the value for the `response_type` parameter, a successful response includes an access token and its type. This argument is used for the implicit grant flow, but is not recommended. Instead, you should use either the authorization code grant flow with PKCE or client authentication set to `none` and with the use of PKCE.
example: ["token", "id_token", "code"] default: ["code"]
swagger:model ResponseTypes
func (ResponseTypes) ContextValidate ¶
ContextValidate validates this response types based on context it is used
type RevocationChannel ¶
type RevocationChannel string
RevocationChannel revocation channel
swagger:model RevocationChannel
func (RevocationChannel) ContextValidate ¶
ContextValidate validates this revocation channel based on context it is used
type RevocationReason ¶
type RevocationReason string
RevocationReason revocation reason
swagger:model RevocationReason
func (RevocationReason) ContextValidate ¶
ContextValidate validates this revocation reason based on context it is used
type RevokeIdentityPoolRoleRequest ¶
type RevokeIdentityPoolRoleRequest struct { // identity pool user pool id IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // identity pool user id IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"` // idp user idp id IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"` // role // Example: user_manager // Enum: ["user_manager"] Role string `json:"role,omitempty" yaml:"role,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type // Enum: ["identity_pool_user","idp"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // idp user workspace id WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
RevokeIdentityPoolRoleRequest revoke identity pool role request
swagger:model RevokeIdentityPoolRoleRequest
func (*RevokeIdentityPoolRoleRequest) ContextValidate ¶
func (m *RevokeIdentityPoolRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this revoke identity pool role request based on context it is used
func (*RevokeIdentityPoolRoleRequest) MarshalBinary ¶
func (m *RevokeIdentityPoolRoleRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RevokeIdentityPoolRoleRequest) UnmarshalBinary ¶
func (m *RevokeIdentityPoolRoleRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RevokeTenantRoleRequest ¶
type RevokeTenantRoleRequest struct { // identity pool user pool id IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // identity pool user id IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"` // idp user idp id IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"` // role // Example: admin // Enum: ["admin","business_admin","auditor","member"] Role string `json:"role,omitempty" yaml:"role,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type // Enum: ["identity_pool_user","idp"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // idp user workspace id WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
RevokeTenantRoleRequest revoke tenant role request
swagger:model RevokeTenantRoleRequest
func (*RevokeTenantRoleRequest) ContextValidate ¶
func (m *RevokeTenantRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this revoke tenant role request based on context it is used
func (*RevokeTenantRoleRequest) MarshalBinary ¶
func (m *RevokeTenantRoleRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RevokeTenantRoleRequest) UnmarshalBinary ¶
func (m *RevokeTenantRoleRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RevokeTokenRequest ¶
type RevokeTokenRequest struct { // optional idp id - if provided subjects will be recalculated if server is using hashed subject type IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"` // list of subjects (min 1, max 100) Subjects []string `json:"subjects" yaml:"subjects"` }
RevokeTokenRequest revoke token request
swagger:model RevokeTokenRequest
func (*RevokeTokenRequest) ContextValidate ¶
ContextValidate validates this revoke token request based on context it is used
func (*RevokeTokenRequest) MarshalBinary ¶
func (m *RevokeTokenRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RevokeTokenRequest) UnmarshalBinary ¶
func (m *RevokeTokenRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RevokeTokensByPoolRequest ¶
type RevokeTokensByPoolRequest struct { // list of userIds (min 1, max 100) Users []string `json:"users" yaml:"users"` }
RevokeTokensByPoolRequest revoke tokens by pool request
swagger:model RevokeTokensByPoolRequest
func (*RevokeTokensByPoolRequest) ContextValidate ¶
func (m *RevokeTokensByPoolRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this revoke tokens by pool request based on context it is used
func (*RevokeTokensByPoolRequest) MarshalBinary ¶
func (m *RevokeTokensByPoolRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RevokeTokensByPoolRequest) UnmarshalBinary ¶
func (m *RevokeTokensByPoolRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RevokeWorkspaceRoleRequest ¶
type RevokeWorkspaceRoleRequest struct { // identity pool user pool id IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // identity pool user id IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"` // idp user idp id IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"` // role // Example: admin // Enum: ["admin","auditor","manager","user_manager","member"] Role string `json:"role,omitempty" yaml:"role,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type // Enum: ["identity_pool_user","idp"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // idp user workspace id WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
RevokeWorkspaceRoleRequest revoke workspace role request
swagger:model RevokeWorkspaceRoleRequest
func (*RevokeWorkspaceRoleRequest) ContextValidate ¶
func (m *RevokeWorkspaceRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this revoke workspace role request based on context it is used
func (*RevokeWorkspaceRoleRequest) MarshalBinary ¶
func (m *RevokeWorkspaceRoleRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RevokeWorkspaceRoleRequest) UnmarshalBinary ¶
func (m *RevokeWorkspaceRoleRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Rfc6902PatchOperation ¶
type Rfc6902PatchOperation struct { // Each operation must have at least one `op` member, which value indicates // the actual operation to be performed against the target (current) configuration. // For a detailed description of available operations, // see the [Operations #4 section of the RFC6902 specification](https://datatracker.ietf.org/doc/html/rfc6902#section-4). // Enum: ["add","remove","replace","move","copy","test"] Op string `json:"op,omitempty" yaml:"op,omitempty"` // String containing a JSON-Pointer value ([RFC6901](https://datatracker.ietf.org/doc/html/rfc6901)) // that references a location within the target configuration where the operation is performed. // // For available paths, reference the exported configuration. Path string `json:"path,omitempty" yaml:"path,omitempty"` // New object value applied to the patched (target) configuration. Value interface{} `json:"value,omitempty" yaml:"value,omitempty"` }
Rfc6902PatchOperation rfc6902 patch operation
swagger:model Rfc6902PatchOperation
func (*Rfc6902PatchOperation) ContextValidate ¶
ContextValidate validates this rfc6902 patch operation based on context it is used
func (*Rfc6902PatchOperation) MarshalBinary ¶
func (m *Rfc6902PatchOperation) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*Rfc6902PatchOperation) UnmarshalBinary ¶
func (m *Rfc6902PatchOperation) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Rfc6902PatchOperations ¶
type Rfc6902PatchOperations []*Rfc6902PatchOperation
Rfc6902PatchOperations rfc6902 patch operations
swagger:model Rfc6902PatchOperations
func (Rfc6902PatchOperations) ContextValidate ¶
ContextValidate validate this rfc6902 patch operations based on the context it is used
type RiskContext ¶
type RiskContext struct { // analyzers Analyzers map[string]float64 `json:"analyzers,omitempty" yaml:"analyzers,omitempty"` // dbfp fingerprint DbfpFingerprint string `json:"dbfp_fingerprint,omitempty" yaml:"dbfp_fingerprint,omitempty"` // id ID RiskID `json:"id,omitempty" yaml:"id,omitempty"` // loa Loa RiskLOA `json:"loa,omitempty" yaml:"loa,omitempty"` }
RiskContext risk context
swagger:model RiskContext
func (*RiskContext) ContextValidate ¶
ContextValidate validate this risk context based on the context it is used
func (*RiskContext) MarshalBinary ¶
func (m *RiskContext) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RiskContext) UnmarshalBinary ¶
func (m *RiskContext) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RiskID ¶
type RiskID string
RiskID Risk engine transaction id
swagger:model RiskID
func (RiskID) ContextValidate ¶
ContextValidate validates this risk ID based on context it is used
type RiskLOA ¶
type RiskLOA float64
RiskLOA Risk engine level of assurance
swagger:model RiskLOA
func (RiskLOA) ContextValidate ¶
ContextValidate validates this risk l o a based on context it is used
type RoleDescriptor ¶
type RoleDescriptor struct { // cache duration CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"` // contact people ContactPeople []*ContactPerson `json:"ContactPeople" yaml:"ContactPeople"` // error URL ErrorURL string `json:"ErrorURL,omitempty" yaml:"ErrorURL,omitempty"` // ID ID string `json:"ID,omitempty" yaml:"ID,omitempty"` // key descriptors KeyDescriptors []*KeyDescriptor `json:"KeyDescriptors" yaml:"KeyDescriptors"` // organization Organization *Organization `json:"Organization,omitempty" yaml:"Organization,omitempty"` // protocol support enumeration ProtocolSupportEnumeration string `json:"ProtocolSupportEnumeration,omitempty" yaml:"ProtocolSupportEnumeration,omitempty"` // signature Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"` // valid until // Format: date-time ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"` }
RoleDescriptor RoleDescriptor represents the SAML element RoleDescriptor.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.1
swagger:model RoleDescriptor
func (*RoleDescriptor) ContextValidate ¶
ContextValidate validate this role descriptor based on the context it is used
func (*RoleDescriptor) MarshalBinary ¶
func (m *RoleDescriptor) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RoleDescriptor) UnmarshalBinary ¶
func (m *RoleDescriptor) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RoleGrantAuditPayload ¶
type RoleGrantAuditPayload struct { // resource Resource *RoleResource `json:"resource,omitempty" yaml:"resource,omitempty"` // role // Enum: ["admin","business_admin","auditor","manager","user_manager","member"] Role string `json:"role,omitempty" yaml:"role,omitempty"` // subject Subject *RoleSubject `json:"subject,omitempty" yaml:"subject,omitempty"` }
RoleGrantAuditPayload role grant audit payload
swagger:model RoleGrantAuditPayload
func (*RoleGrantAuditPayload) ContextValidate ¶
ContextValidate validate this role grant audit payload based on the context it is used
func (*RoleGrantAuditPayload) MarshalBinary ¶
func (m *RoleGrantAuditPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RoleGrantAuditPayload) UnmarshalBinary ¶
func (m *RoleGrantAuditPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RoleResource ¶
type RoleResource struct { // identity pool id IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type // Enum: ["tenant","workspace","identity_pool"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // workspace id WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
RoleResource role resource
swagger:model RoleResource
func (*RoleResource) ContextValidate ¶
ContextValidate validates this role resource based on context it is used
func (*RoleResource) MarshalBinary ¶
func (m *RoleResource) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RoleResource) UnmarshalBinary ¶
func (m *RoleResource) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RoleResources ¶
type RoleResources struct { // resources Resources []*ExtendedRoleResource `json:"resources" yaml:"resources"` }
RoleResources role resources
swagger:model RoleResources
func (*RoleResources) ContextValidate ¶
ContextValidate validate this role resources based on the context it is used
func (*RoleResources) MarshalBinary ¶
func (m *RoleResources) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RoleResources) UnmarshalBinary ¶
func (m *RoleResources) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RoleSubject ¶
type RoleSubject struct { // identity pool user pool id IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // identity pool user id IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"` // idp user idp id IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type // Enum: ["identity_pool_user","idp"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // idp user workspace id WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
RoleSubject role subject
swagger:model RoleSubject
func (*RoleSubject) ContextValidate ¶
ContextValidate validates this role subject based on context it is used
func (*RoleSubject) MarshalBinary ¶
func (m *RoleSubject) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RoleSubject) UnmarshalBinary ¶
func (m *RoleSubject) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type RotateClientSecretResponse ¶
type RotateClientSecretResponse struct { // secret Secret string `json:"secret,omitempty" yaml:"secret,omitempty"` }
RotateClientSecretResponse rotate client secret response
swagger:model RotateClientSecretResponse
func (*RotateClientSecretResponse) ContextValidate ¶
func (m *RotateClientSecretResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this rotate client secret response based on context it is used
func (*RotateClientSecretResponse) MarshalBinary ¶
func (m *RotateClientSecretResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*RotateClientSecretResponse) UnmarshalBinary ¶
func (m *RotateClientSecretResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SAMLClientMetadataResponse ¶
type SAMLClientMetadataResponse struct { // in:body RawXML string `json:"raw_xml,omitempty" yaml:"raw_xml,omitempty"` }
SAMLClientMetadataResponse s a m l client metadata response
swagger:model SAMLClientMetadataResponse
func (*SAMLClientMetadataResponse) ContextValidate ¶
func (m *SAMLClientMetadataResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this s a m l client metadata response based on context it is used
func (*SAMLClientMetadataResponse) MarshalBinary ¶
func (m *SAMLClientMetadataResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SAMLClientMetadataResponse) UnmarshalBinary ¶
func (m *SAMLClientMetadataResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SAMLConfiguration ¶
type SAMLConfiguration struct { // Allows to change default subject name id. // The default one will be 'uid', even if the value is empty. SubjectNameID string `json:"subject_name_id,omitempty" yaml:"subject_name_id,omitempty"` }
SAMLConfiguration s a m l configuration
swagger:model SAMLConfiguration
func (*SAMLConfiguration) ContextValidate ¶
ContextValidate validates this s a m l configuration based on context it is used
func (*SAMLConfiguration) MarshalBinary ¶
func (m *SAMLConfiguration) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SAMLConfiguration) UnmarshalBinary ¶
func (m *SAMLConfiguration) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SAMLCredentials ¶
type SAMLCredentials struct { // The certificate of your IDP // // The certificate must start with `-----BEGIN CERTIFICATE-----` and end with `-----END CERTIFICATE-----`. IdpCertificate string `json:"idp_certificate,omitempty" yaml:"idp_certificate,omitempty"` }
SAMLCredentials SAML IDP specific credentials
swagger:model SAMLCredentials
func (*SAMLCredentials) ContextValidate ¶
ContextValidate validates this s a m l credentials based on context it is used
func (*SAMLCredentials) MarshalBinary ¶
func (m *SAMLCredentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SAMLCredentials) UnmarshalBinary ¶
func (m *SAMLCredentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SAMLIDP ¶
type SAMLIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // credentials Credentials *SAMLCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // settings Settings *SAMLSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
SAMLIDP s a m l ID p
swagger:model SAMLIDP
func (*SAMLIDP) ContextValidate ¶
ContextValidate validate this s a m l ID p based on the context it is used
func (*SAMLIDP) MarshalBinary ¶
MarshalBinary interface implementation
func (*SAMLIDP) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type SAMLSettings ¶
type SAMLSettings struct { // Unique id of a service provider // Example: https://localhost:8443/default/default/login EntityIssuer string `json:"entity_issuer,omitempty" yaml:"entity_issuer,omitempty"` // The attribute name from the `AttributeStatement` SAML response which is used as an identifier in ACP // // Applies only when `identifierSource` parameter is set to `attribute`. IdentifierAttribute string `json:"identifier_attribute,omitempty" yaml:"identifier_attribute,omitempty"` // The source for an identifier // // The `identifierSource` parameter can have either the `subject` or the `attribute` value. // // It is used to provide an unique user attribute that is used as an identifier in ACP. // // Depending on which identifier source you choose, you must define either the // `identifierAttribute` or the `subjectNameIDFormat` parameter. IdentifierSource string `json:"identifier_source,omitempty" yaml:"identifier_source,omitempty"` // IDP metadata URL MetadataURL string `json:"metadata_url,omitempty" yaml:"metadata_url,omitempty"` // IDP metadata xml MetadataXML string `json:"metadata_xml,omitempty" yaml:"metadata_xml,omitempty"` // If enabled, the verification, if the `InResponseTo` parameter matches the original ID attribute // sent from ACP, is skipped. // // Enable the `skipInResponseToVerification` flag when the `InResponseTo` parameter is not // returned by your IDP. SkipInResponseToVerification bool `json:"skip_in_response_to_verification,omitempty" yaml:"skip_in_response_to_verification,omitempty"` // String represented SSO URL (endpoint) where the SAML request is sent // Example: https://test-dev-ed.my.salesforce.com/idp/endpoint/HttpPost SsoURL string `json:"sso_url,omitempty" yaml:"sso_url,omitempty"` // Name ID format of a SAML subject // // It applies only when the `identifierSource` parameter is set to `subject`. // // Allowed values: // // `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` // // `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` // // `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` // // `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` // // `urn:oasis:names:tc:SAML:2.0:nameid-format:encrypted` // // `urn:oasis:names:tc:SAML:2.0:nameid-format:entity` // // `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` // // `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` // // `urn:oasis:names:tc:SAML:2.0:nameid-format:transient` // // default value: // `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` SubjectNameIDFormat string `json:"subject_name_id_format,omitempty" yaml:"subject_name_id_format,omitempty"` }
SAMLSettings SAML IDP specific settings
swagger:model SAMLSettings
func (*SAMLSettings) ContextValidate ¶
ContextValidate validates this s a m l settings based on context it is used
func (*SAMLSettings) MarshalBinary ¶
func (m *SAMLSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SAMLSettings) UnmarshalBinary ¶
func (m *SAMLSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SAMLV2Credentials ¶
type SAMLV2Credentials struct { // saml authn request signing cert SigningCert string `json:"signing_cert,omitempty" yaml:"signing_cert,omitempty"` // saml authn request signing key SigningKey string `json:"signing_key,omitempty" yaml:"signing_key,omitempty"` }
SAMLV2Credentials s a m l v2 credentials
swagger:model SAMLV2Credentials
func (*SAMLV2Credentials) ContextValidate ¶
ContextValidate validates this s a m l v2 credentials based on context it is used
func (*SAMLV2Credentials) MarshalBinary ¶
func (m *SAMLV2Credentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SAMLV2Credentials) UnmarshalBinary ¶
func (m *SAMLV2Credentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SAMLV2IDP ¶
type SAMLV2IDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // credentials Credentials *SAMLV2Credentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // settings Settings *SAMLV2Settings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
SAMLV2IDP s a m l v2 ID p
swagger:model SAMLV2IDP
func (*SAMLV2IDP) ContextValidate ¶
ContextValidate validate this s a m l v2 ID p based on the context it is used
func (*SAMLV2IDP) MarshalBinary ¶
MarshalBinary interface implementation
func (*SAMLV2IDP) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type SAMLV2Settings ¶
type SAMLV2Settings struct { // IDP metadata URL MetadataURL string `json:"metadata_url,omitempty" yaml:"metadata_url,omitempty"` // IDP metadata xml MetadataXML string `json:"metadata_xml,omitempty" yaml:"metadata_xml,omitempty"` // SAML name id format. // // Format used in the NameIDPolicy for authentication requests // Example: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress // Enum: ["urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress","urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified","urn:oasis:names:tc:SAML:1.1:nameid-format:transient","urn:oasis:names:tc:SAML:1.1:nameid-format:persistent"] NameIDFormat string `json:"name_id_format,omitempty" yaml:"name_id_format,omitempty"` // SAML signing method // Example: rsa-sha-256 // Enum: ["rsa-sha-256","rsa-sha-512","rsa-sha-1"] SigningMethod string `json:"signing_method,omitempty" yaml:"signing_method,omitempty"` // SAML Assertion attribute that will be mapped to the Subject // // If empty than NameID will be used instead. UserIDAttribute string `json:"user_id_attribute,omitempty" yaml:"user_id_attribute,omitempty"` }
SAMLV2Settings s a m l v2 settings
swagger:model SAMLV2Settings
func (*SAMLV2Settings) ContextValidate ¶
ContextValidate validates this s a m l v2 settings based on context it is used
func (*SAMLV2Settings) MarshalBinary ¶
func (m *SAMLV2Settings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SAMLV2Settings) UnmarshalBinary ¶
func (m *SAMLV2Settings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SMSAuth ¶
type SMSAuth struct { // The Twilio Auth Token. // Required: true AuthToken string `json:"auth_token" yaml:"auth_token"` // The Twilio Account SID. // Required: true Sid string `json:"sid" yaml:"sid"` }
SMSAuth s m s auth
swagger:model SMSAuth
func (*SMSAuth) ContextValidate ¶
ContextValidate validates this s m s auth based on context it is used
func (*SMSAuth) MarshalBinary ¶
MarshalBinary interface implementation
func (*SMSAuth) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type SMSSettings ¶
type SMSSettings struct { // Custom message template. // // If not set, the default is used. CustomMessageTemplate string `json:"custom_message_template,omitempty" yaml:"custom_message_template,omitempty"` // Custom SMS From phone number. // // If not set, the default is used. CustomSource string `json:"custom_source,omitempty" yaml:"custom_source,omitempty"` // otp Otp *OTPConfiguration `json:"otp,omitempty" yaml:"otp,omitempty"` // SMS provider. // Example: embedded // Enum: ["twilio","embedded"] Provider string `json:"provider,omitempty" yaml:"provider,omitempty"` }
SMSSettings s m s settings
swagger:model SMSSettings
func (*SMSSettings) ContextValidate ¶
ContextValidate validate this s m s settings based on the context it is used
func (*SMSSettings) MarshalBinary ¶
func (m *SMSSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SMSSettings) UnmarshalBinary ¶
func (m *SMSSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SPSSODescriptor ¶
type SPSSODescriptor struct { // artifact resolution services ArtifactResolutionServices []*IndexedEndpoint `json:"ArtifactResolutionServices" yaml:"ArtifactResolutionServices"` // assertion consumer services AssertionConsumerServices []*IndexedEndpoint `json:"AssertionConsumerServices" yaml:"AssertionConsumerServices"` // attribute consuming services AttributeConsumingServices []*AttributeConsumingService `json:"AttributeConsumingServices" yaml:"AttributeConsumingServices"` // authn requests signed AuthnRequestsSigned bool `json:"AuthnRequestsSigned,omitempty" yaml:"AuthnRequestsSigned,omitempty"` // cache duration CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"` // contact people ContactPeople []*ContactPerson `json:"ContactPeople" yaml:"ContactPeople"` // error URL ErrorURL string `json:"ErrorURL,omitempty" yaml:"ErrorURL,omitempty"` // ID ID string `json:"ID,omitempty" yaml:"ID,omitempty"` // key descriptors KeyDescriptors []*KeyDescriptor `json:"KeyDescriptors" yaml:"KeyDescriptors"` // manage name ID services ManageNameIDServices []*Endpoint `json:"ManageNameIDServices" yaml:"ManageNameIDServices"` // name ID formats NameIDFormats []NameIDFormat `json:"NameIDFormats" yaml:"NameIDFormats"` // organization Organization *Organization `json:"Organization,omitempty" yaml:"Organization,omitempty"` // protocol support enumeration ProtocolSupportEnumeration string `json:"ProtocolSupportEnumeration,omitempty" yaml:"ProtocolSupportEnumeration,omitempty"` // signature Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"` // single logout services SingleLogoutServices []*Endpoint `json:"SingleLogoutServices" yaml:"SingleLogoutServices"` // valid until // Format: date-time ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"` // want assertions signed WantAssertionsSigned bool `json:"WantAssertionsSigned,omitempty" yaml:"WantAssertionsSigned,omitempty"` // XML name XMLName *Name `json:"XMLName,omitempty" yaml:"XMLName,omitempty"` }
SPSSODescriptor SPSSODescriptor represents the SAML SPSSODescriptorType object.
See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.2
swagger:model SPSSODescriptor
func (*SPSSODescriptor) ContextValidate ¶
ContextValidate validate this s p s s o descriptor based on the context it is used
func (*SPSSODescriptor) MarshalBinary ¶
func (m *SPSSODescriptor) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SPSSODescriptor) UnmarshalBinary ¶
func (m *SPSSODescriptor) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SSOConfiguration ¶
type SSOConfiguration struct { // Domain for the SSO cookie Domain string `json:"domain,omitempty" yaml:"domain,omitempty"` // If enabled, single-sign-on (SSO) is active for all IDPs in this workspace. // Example: false Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"` // loa threshold LoaThreshold RiskLOA `json:"loa_threshold,omitempty" yaml:"loa_threshold,omitempty"` // Additional domains permitted in the logout redirect_to parameter LogoutRedirectDomains []string `json:"logout_redirect_domains" yaml:"logout_redirect_domains"` // Active TTL - Active SSO sessions expire after MaxAge nanoseconds. // Format: duration MaxAge strfmt.Duration `json:"max_age,omitempty" yaml:"max_age,omitempty"` // Idle TTL - Idle SSO sessions expire after MaxIdle nanoseconds. // Format: duration MaxIdle strfmt.Duration `json:"max_idle,omitempty" yaml:"max_idle,omitempty"` // Admin-configured target URL after logout, if redirect_to omitted or invalid PostLogoutURL string `json:"post_logout_url,omitempty" yaml:"post_logout_url,omitempty"` }
SSOConfiguration s s o configuration
swagger:model SSOConfiguration
func (*SSOConfiguration) ContextValidate ¶
ContextValidate validate this s s o configuration based on the context it is used
func (*SSOConfiguration) MarshalBinary ¶
func (m *SSOConfiguration) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SSOConfiguration) UnmarshalBinary ¶
func (m *SSOConfiguration) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SameSite ¶
type SameSite string
SameSite same site
swagger:model SameSite
func (SameSite) ContextValidate ¶
ContextValidate validates this same site based on context it is used
type SchemaAuditPayload ¶
type SchemaAuditPayload struct { // created at // Format: date-time CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"` // description Description string `json:"description,omitempty" yaml:"description,omitempty"` // name Name string `json:"name,omitempty" yaml:"name,omitempty"` // schema id SchemaID string `json:"schema_id,omitempty" yaml:"schema_id,omitempty"` // system System bool `json:"system,omitempty" yaml:"system,omitempty"` // updated at // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"` }
SchemaAuditPayload schema audit payload
swagger:model SchemaAuditPayload
func (*SchemaAuditPayload) ContextValidate ¶
ContextValidate validates this schema audit payload based on context it is used
func (*SchemaAuditPayload) MarshalBinary ¶
func (m *SchemaAuditPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SchemaAuditPayload) UnmarshalBinary ¶
func (m *SchemaAuditPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Scope ¶
type Scope struct { // Authorization server identifier // Example: my-server AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // The scope description displayed as a hint on a consent page // Example: This scope value requests offline access using refresh token Description string `json:"description,omitempty" yaml:"description,omitempty"` // The scope name displayed on a consent page // Example: Offline Access DisplayName string `json:"display_name,omitempty" yaml:"display_name,omitempty"` // Scope identifier // Example: scope-1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // Request this scope by default for all clients who subscribed to this scope Implicit bool `json:"implicit,omitempty" yaml:"implicit,omitempty"` // Do not ask for consent for this scope ImplicitGrant bool `json:"implicit_grant,omitempty" yaml:"implicit_grant,omitempty"` // metadata Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // Scope name // Example: offline_access Name string `json:"name,omitempty" yaml:"name,omitempty"` // Tenant identifier // Example: my-company TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // Disable storage of scope grants Transient bool `json:"transient,omitempty" yaml:"transient,omitempty"` }
Scope scope
swagger:model Scope
func (*Scope) ContextValidate ¶
ContextValidate validate this scope based on the context it is used
func (*Scope) MarshalBinary ¶
MarshalBinary interface implementation
func (*Scope) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type ScopeClaimFormat ¶
type ScopeClaimFormat string
ScopeClaimFormat scope claim format
swagger:model ScopeClaimFormat
func (ScopeClaimFormat) ContextValidate ¶
ContextValidate validates this scope claim format based on context it is used
type ScopeGrant ¶
type ScopeGrant struct { // Identifier of a client application that is granted with the scope. // Example: bugkgm23g9kregtu051g ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // Time when the scope was granted // Format: date-time GivenAt strfmt.DateTime `json:"given_at,omitempty" yaml:"given_at,omitempty"` // The scope name with its actual value // Example: accounts.read.own GrantedScopeName string `json:"granted_scope_name,omitempty" yaml:"granted_scope_name,omitempty"` // Language Language string `json:"language,omitempty" yaml:"language,omitempty"` // The scope name as it's set initially. This parameter supports dynamic scope syntax, thus can include a scope // root—a fixed core of the dynamic scope name supplemented with a wildcard—a symbol representing // an adjustable extension to the scope root allowing to retrieve a specific requested scope. // // The basic dynamic scope template is as follows: `[scope-root.*]` where `*` is a wildcard. // Example: accounts.read.* ScopeName string `json:"scope_name,omitempty" yaml:"scope_name,omitempty"` // Identifier of a server where the client app is hosted. // Example: my-server ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // Identifier of a user who granted the scope. Subject string `json:"subject,omitempty" yaml:"subject,omitempty"` // Identifier of the tenant where the client app is hosted. // Example: my-company TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` }
ScopeGrant scope grant
swagger:model ScopeGrant
func (*ScopeGrant) ContextValidate ¶
ContextValidate validates this scope grant based on context it is used
func (*ScopeGrant) MarshalBinary ¶
func (m *ScopeGrant) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ScopeGrant) UnmarshalBinary ¶
func (m *ScopeGrant) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ScopePrivacyInformation ¶
type ScopePrivacyInformation struct { // pii categories PiiCategories []*PIICategory `json:"pii_categories" yaml:"pii_categories"` // purpose Purpose string `json:"purpose,omitempty" yaml:"purpose,omitempty"` }
ScopePrivacyInformation scope privacy information
swagger:model ScopePrivacyInformation
func (*ScopePrivacyInformation) ContextValidate ¶
func (m *ScopePrivacyInformation) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this scope privacy information based on the context it is used
func (*ScopePrivacyInformation) MarshalBinary ¶
func (m *ScopePrivacyInformation) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ScopePrivacyInformation) UnmarshalBinary ¶
func (m *ScopePrivacyInformation) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ScopeWithService ¶
type ScopeWithService struct { // Authorization server identifier // Example: my-server AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // The scope description displayed as a hint on a consent page // Example: This scope value requests offline access using refresh token Description string `json:"description,omitempty" yaml:"description,omitempty"` // The scope name displayed on a consent page // Example: Offline Access DisplayName string `json:"display_name,omitempty" yaml:"display_name,omitempty"` // Scope identifier // Example: scope-1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // Request this scope by default for all clients who subscribed to this scope Implicit bool `json:"implicit,omitempty" yaml:"implicit,omitempty"` // Do not ask for consent for this scope ImplicitGrant bool `json:"implicit_grant,omitempty" yaml:"implicit_grant,omitempty"` // metadata Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // Scope name // Example: offline_access Name string `json:"name,omitempty" yaml:"name,omitempty"` // service Service *Service `json:"service,omitempty" yaml:"service,omitempty"` // Tenant identifier // Example: my-company TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // Disable storage of scope grants Transient bool `json:"transient,omitempty" yaml:"transient,omitempty"` // with service WithService bool `json:"with_service,omitempty" yaml:"with_service,omitempty"` }
ScopeWithService scope with service
swagger:model ScopeWithService
func (*ScopeWithService) ContextValidate ¶
ContextValidate validate this scope with service based on the context it is used
func (*ScopeWithService) MarshalBinary ¶
func (m *ScopeWithService) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ScopeWithService) UnmarshalBinary ¶
func (m *ScopeWithService) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ScopeWithServiceID ¶
type ScopeWithServiceID struct { // Authorization server identifier // Example: my-server AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // The scope description displayed as a hint on a consent page // Example: This scope value requests offline access using refresh token Description string `json:"description,omitempty" yaml:"description,omitempty"` // The scope name displayed on a consent page // Example: Offline Access DisplayName string `json:"display_name,omitempty" yaml:"display_name,omitempty"` // Scope identifier // Example: scope-1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // Request this scope by default for all clients who subscribed to this scope Implicit bool `json:"implicit,omitempty" yaml:"implicit,omitempty"` // Do not ask for consent for this scope ImplicitGrant bool `json:"implicit_grant,omitempty" yaml:"implicit_grant,omitempty"` // metadata Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // Scope name // Example: offline_access Name string `json:"name,omitempty" yaml:"name,omitempty"` // optional service id // Example: 1 ServiceID string `json:"service_id,omitempty" yaml:"service_id,omitempty"` // Tenant identifier // Example: my-company TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // Disable storage of scope grants Transient bool `json:"transient,omitempty" yaml:"transient,omitempty"` }
ScopeWithServiceID scope with service ID
swagger:model ScopeWithServiceID
func (*ScopeWithServiceID) ContextValidate ¶
ContextValidate validate this scope with service ID based on the context it is used
func (*ScopeWithServiceID) MarshalBinary ¶
func (m *ScopeWithServiceID) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ScopeWithServiceID) UnmarshalBinary ¶
func (m *ScopeWithServiceID) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ScopesGrantedPayload ¶
type ScopesGrantedPayload struct { // List of scopes to grant. NewScopeGrants []*ScopeGrant `json:"new_scope_grants" yaml:"new_scope_grants"` }
ScopesGrantedPayload scopes granted payload
swagger:model ScopesGrantedPayload
func (*ScopesGrantedPayload) ContextValidate ¶
ContextValidate validate this scopes granted payload based on the context it is used
func (*ScopesGrantedPayload) MarshalBinary ¶
func (m *ScopesGrantedPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ScopesGrantedPayload) UnmarshalBinary ¶
func (m *ScopesGrantedPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ScopesWithServices ¶
type ScopesWithServices struct { // scopes Scopes []*ScopeWithService `json:"scopes" yaml:"scopes"` }
ScopesWithServices scopes with services
swagger:model ScopesWithServices
func (*ScopesWithServices) ContextValidate ¶
ContextValidate validate this scopes with services based on the context it is used
func (*ScopesWithServices) MarshalBinary ¶
func (m *ScopesWithServices) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ScopesWithServices) UnmarshalBinary ¶
func (m *ScopesWithServices) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Script ¶
type Script struct { // ID of the authorization server (workspace) where the script is created // Required: true AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"` // Script body Body string `json:"body,omitempty" yaml:"body,omitempty"` // env version EnvVersion FnEnvVersion `json:"env_version,omitempty" yaml:"env_version,omitempty"` // Unique ID of your script // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // Display name of your script Name string `json:"name,omitempty" yaml:"name,omitempty"` // ID of the tenant where the script is created // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // Input data for testing this script TestInput string `json:"test_input,omitempty" yaml:"test_input,omitempty"` }
Script script
swagger:model Script
func (*Script) ContextValidate ¶
ContextValidate validate this script based on the context it is used
func (*Script) MarshalBinary ¶
MarshalBinary interface implementation
func (*Script) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type ScriptDebug ¶
type ScriptDebug struct { // ID of the authorization server (workspace) where the script is created // Required: true AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"` // Expiration interval // Example: 60s // Format: duration Duration strfmt.Duration `json:"duration,omitempty" yaml:"duration,omitempty"` // ID of the script to be debugged // Required: true ScriptID string `json:"script_id" yaml:"script_id"` // Time that script debugging was enabled // Format: date-time StartedAt strfmt.DateTime `json:"started_at,omitempty" yaml:"started_at,omitempty"` // ID of the tenant where the script is created // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` }
ScriptDebug script debug
swagger:model ScriptDebug
func (*ScriptDebug) ContextValidate ¶
ContextValidate validates this script debug based on context it is used
func (*ScriptDebug) MarshalBinary ¶
func (m *ScriptDebug) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ScriptDebug) UnmarshalBinary ¶
func (m *ScriptDebug) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ScriptDebugs ¶
type ScriptDebugs struct { // list of script debug triggers ScriptDebugs []*ScriptDebug `json:"script_debugs" yaml:"script_debugs"` }
ScriptDebugs script debugs
swagger:model ScriptDebugs
func (*ScriptDebugs) ContextValidate ¶
ContextValidate validate this script debugs based on the context it is used
func (*ScriptDebugs) MarshalBinary ¶
func (m *ScriptDebugs) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ScriptDebugs) UnmarshalBinary ¶
func (m *ScriptDebugs) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ScriptExecutionAuditPayload ¶
type ScriptExecutionAuditPayload struct { // caught err CaughtErr string `json:"caught_err,omitempty" yaml:"caught_err,omitempty"` // duration // Format: duration Duration strfmt.Duration `json:"duration,omitempty" yaml:"duration,omitempty"` // error Error string `json:"error,omitempty" yaml:"error,omitempty"` // executed at // Format: date-time ExecutedAt strfmt.DateTime `json:"executed_at,omitempty" yaml:"executed_at,omitempty"` // execution point // Enum: ["post_authn_ctx","allowed_idp_ids","token_minting","client_token_minting"] ExecutionPoint string `json:"execution_point,omitempty" yaml:"execution_point,omitempty"` // input Input map[string]interface{} `json:"input,omitempty" yaml:"input,omitempty"` // log level LogLevel string `json:"log_level,omitempty" yaml:"log_level,omitempty"` // output Output map[string]interface{} `json:"output,omitempty" yaml:"output,omitempty"` // script id ScriptID string `json:"script_id,omitempty" yaml:"script_id,omitempty"` // script name ScriptName string `json:"script_name,omitempty" yaml:"script_name,omitempty"` // stderr Stderr string `json:"stderr,omitempty" yaml:"stderr,omitempty"` // stdout Stdout string `json:"stdout,omitempty" yaml:"stdout,omitempty"` }
ScriptExecutionAuditPayload script execution audit payload
swagger:model ScriptExecutionAuditPayload
func (*ScriptExecutionAuditPayload) ContextValidate ¶
func (m *ScriptExecutionAuditPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this script execution audit payload based on context it is used
func (*ScriptExecutionAuditPayload) MarshalBinary ¶
func (m *ScriptExecutionAuditPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ScriptExecutionAuditPayload) UnmarshalBinary ¶
func (m *ScriptExecutionAuditPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ScriptExecutionPoint ¶
type ScriptExecutionPoint struct { // Optional script ID // Example: 1 ScriptID string `json:"script_id,omitempty" yaml:"script_id,omitempty"` // The ID of your authorization server (workspace) // Example: default // Required: true ServerID string `json:"server_id" yaml:"server_id"` // String representation of the target's ID // Example: 1 // Required: true TargetFk string `json:"target_fk" yaml:"target_fk"` // The ID of your tenant // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // String representation of the script execution point type // Example: post_authn_ctx // Required: true // Enum: ["post_authn_ctx","allowed_idp_ids","token_minting","client_token_minting"] Type string `json:"type" yaml:"type"` }
ScriptExecutionPoint script execution point
swagger:model ScriptExecutionPoint
func (*ScriptExecutionPoint) ContextValidate ¶
ContextValidate validates this script execution point based on context it is used
func (*ScriptExecutionPoint) MarshalBinary ¶
func (m *ScriptExecutionPoint) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ScriptExecutionPoint) UnmarshalBinary ¶
func (m *ScriptExecutionPoint) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ScriptExecutionPoints ¶
type ScriptExecutionPoints struct { // list of script executions ExecutionPoints []*ScriptExecutionPoint `json:"execution_points" yaml:"execution_points"` }
ScriptExecutionPoints script execution points
swagger:model ScriptExecutionPoints
func (*ScriptExecutionPoints) ContextValidate ¶
ContextValidate validate this script execution points based on the context it is used
func (*ScriptExecutionPoints) MarshalBinary ¶
func (m *ScriptExecutionPoints) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ScriptExecutionPoints) UnmarshalBinary ¶
func (m *ScriptExecutionPoints) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ScriptExecutionResult ¶
type ScriptExecutionResult struct { // name of the error CaughtErr string `json:"caught_err,omitempty" yaml:"caught_err,omitempty"` // script execution time // Format: duration Duration strfmt.Duration `json:"duration,omitempty" yaml:"duration,omitempty"` // script id ID string `json:"id,omitempty" yaml:"id,omitempty"` // script input Input map[string]interface{} `json:"input,omitempty" yaml:"input,omitempty"` // script output Output map[string]interface{} `json:"output,omitempty" yaml:"output,omitempty"` // script standard error, e.g. console.error() Stderr string `json:"stderr,omitempty" yaml:"stderr,omitempty"` // script standard output, e.g. console.log() Stdout string `json:"stdout,omitempty" yaml:"stdout,omitempty"` }
ScriptExecutionResult script execution result
swagger:model ScriptExecutionResult
func (*ScriptExecutionResult) ContextValidate ¶
ContextValidate validates this script execution result based on context it is used
func (*ScriptExecutionResult) MarshalBinary ¶
func (m *ScriptExecutionResult) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ScriptExecutionResult) UnmarshalBinary ¶
func (m *ScriptExecutionResult) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ScriptRuntime ¶
type ScriptRuntime struct { // Preinstalled nodejs libraries Dependencies map[string]string `json:"dependencies,omitempty" yaml:"dependencies,omitempty"` // Node executor environment runtime version EnvVersion string `json:"env_version,omitempty" yaml:"env_version,omitempty"` // Nodejs engine version NodeVersion string `json:"node_version,omitempty" yaml:"node_version,omitempty"` // Nodejs executor end-of-life date // Format: date-time ValidUntil strfmt.DateTime `json:"valid_until,omitempty" yaml:"valid_until,omitempty"` }
ScriptRuntime script runtime
swagger:model ScriptRuntime
func (*ScriptRuntime) ContextValidate ¶
ContextValidate validates this script runtime based on context it is used
func (*ScriptRuntime) MarshalBinary ¶
func (m *ScriptRuntime) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ScriptRuntime) UnmarshalBinary ¶
func (m *ScriptRuntime) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Scripts ¶
type Scripts struct { // list of scripts Scripts []*Script `json:"scripts" yaml:"scripts"` }
Scripts scripts
swagger:model Scripts
func (*Scripts) ContextValidate ¶
ContextValidate validate this scripts based on the context it is used
func (*Scripts) MarshalBinary ¶
MarshalBinary interface implementation
func (*Scripts) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type Secret ¶
type Secret struct { // Time when the secret was created // Format: date-time CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"` // Unique ID of your secret // Example: secret-pet // Required: true ID string `json:"id" yaml:"id"` // Value of a secret // Example: cat // Required: true Secret string `json:"secret" yaml:"secret"` // ID of your authorization server (workspace) // Example: default // Required: true ServerID string `json:"server_id" yaml:"server_id"` // ID of your tenant // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // value Value string `json:"value,omitempty" yaml:"value,omitempty"` }
Secret secret
swagger:model Secret
func (*Secret) ContextValidate ¶
ContextValidate validates this secret based on context it is used
func (*Secret) MarshalBinary ¶
MarshalBinary interface implementation
func (*Secret) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type SecretsResponse ¶
type SecretsResponse struct { // secrets Secrets []*Secret `json:"secrets" yaml:"secrets"` }
SecretsResponse secrets response
swagger:model SecretsResponse
func (*SecretsResponse) ContextValidate ¶
ContextValidate validate this secrets response based on the context it is used
func (*SecretsResponse) MarshalBinary ¶
func (m *SecretsResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SecretsResponse) UnmarshalBinary ¶
func (m *SecretsResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SecureOptions ¶
type SecureOptions struct { // AllowedHosts is a slice of fully qualified domain names that are allowed. Default is an empty slice, which allows any and all host names. AllowedHosts []string `json:"AllowedHosts" yaml:"AllowedHosts"` // AllowedHostsAreRegex determines, if the provided `AllowedHosts` slice contains valid regular expressions. If this flag is set to true, every request's host will be checked against these expressions. Default is false. AllowedHostsAreRegex bool `json:"AllowedHostsAreRegex,omitempty" yaml:"AllowedHostsAreRegex,omitempty"` // If BrowserXssFilter is true, adds the X-XSS-Protection header with the value `1; mode=block`. Default is false. BrowserXSSFilter bool `json:"BrowserXssFilter,omitempty" yaml:"BrowserXssFilter,omitempty"` // ContentSecurityPolicy allows the Content-Security-Policy header value to be set with a custom value. Default is "". ContentSecurityPolicy string `json:"ContentSecurityPolicy,omitempty" yaml:"ContentSecurityPolicy,omitempty"` // ContentSecurityPolicyReportOnly allows the Content-Security-Policy-Report-Only header value to be set with a custom value. Default is "". ContentSecurityPolicyReportOnly string `json:"ContentSecurityPolicyReportOnly,omitempty" yaml:"ContentSecurityPolicyReportOnly,omitempty"` // If ContentTypeNosniff is true, adds the X-Content-Type-Options header with the value `nosniff`. Default is false. ContentTypeNosniff bool `json:"ContentTypeNosniff,omitempty" yaml:"ContentTypeNosniff,omitempty"` // CrossOriginOpenerPolicy allows you to ensure a top-level document does not share a browsing context group with cross-origin documents. Default is "". // Reference: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cross-Origin-Opener-Policy CrossOriginOpenerPolicy string `json:"CrossOriginOpenerPolicy,omitempty" yaml:"CrossOriginOpenerPolicy,omitempty"` // CustomBrowserXssValue allows the X-XSS-Protection header value to be set with a custom value. This overrides the BrowserXssFilter option. Default is "". CustomBrowserXSSValue string `json:"CustomBrowserXssValue,omitempty" yaml:"CustomBrowserXssValue,omitempty"` // Passing a template string will replace `$NONCE` with a dynamic nonce value of 16 bytes for each request which can be later retrieved using the Nonce function. // Eg: script-src $NONCE -> script-src 'nonce-a2ZobGFoZg==' // CustomFrameOptionsValue allows the X-Frame-Options header value to be set with a custom value. This overrides the FrameDeny option. Default is "". CustomFrameOptionsValue string `json:"CustomFrameOptionsValue,omitempty" yaml:"CustomFrameOptionsValue,omitempty"` // ExpectCTHeader allows the Expect-CT header value to be set with a custom value. Default is "". ExpectCTHeader string `json:"ExpectCTHeader,omitempty" yaml:"ExpectCTHeader,omitempty"` // FeaturePolicy allows to selectively enable and disable use of various browser features and APIs. Default is "". // Deprecated: This header has been renamed to Permissions-Policy. FeaturePolicy string `json:"FeaturePolicy,omitempty" yaml:"FeaturePolicy,omitempty"` // If ForceSTSHeader is set to true, the STS header will be added even when the connection is HTTP. Default is false. ForceSTSHeader bool `json:"ForceSTSHeader,omitempty" yaml:"ForceSTSHeader,omitempty"` // If FrameDeny is set to true, adds the X-Frame-Options header with the value of `DENY`. Default is false. FrameDeny bool `json:"FrameDeny,omitempty" yaml:"FrameDeny,omitempty"` // HostsProxyHeaders is a set of header keys that may hold a proxied hostname value for the request. HostsProxyHeaders []string `json:"HostsProxyHeaders" yaml:"HostsProxyHeaders"` // When developing, the AllowedHosts, SSL, and STS options can cause some unwanted effects. Usually testing happens on http, not https, and on localhost, not your production domain... so set this to true for dev environment. // If you would like your development environment to mimic production with complete Host blocking, SSL redirects, and STS headers, leave this as false. Default if false. IsDevelopment bool `json:"IsDevelopment,omitempty" yaml:"IsDevelopment,omitempty"` // PermissionsPolicy allows to selectively enable and disable use of various browser features and APIs. Default is "". PermissionsPolicy string `json:"PermissionsPolicy,omitempty" yaml:"PermissionsPolicy,omitempty"` // PublicKey implements HPKP to prevent MITM attacks with forged certificates. Default is "". // Deprecated: This feature is no longer recommended. Though some browsers might still support it, it may have already been removed from the relevant web standards, may be in the process of being dropped, or may only be kept for compatibility purposes. Avoid using it, and update existing code if possible. PublicKey string `json:"PublicKey,omitempty" yaml:"PublicKey,omitempty"` // ReferrerPolicy allows sites to control when browsers will pass the Referer header to other sites. Default is "". ReferrerPolicy string `json:"ReferrerPolicy,omitempty" yaml:"ReferrerPolicy,omitempty"` // If SSLForceHost is true and SSLHost is set, requests will be forced to use SSLHost even the ones that are already using SSL. Default is false. SSLForceHost bool `json:"SSLForceHost,omitempty" yaml:"SSLForceHost,omitempty"` // SSLHost is the host name that is used to redirect http requests to https. Default is "", which indicates to use the same host. SSLHost string `json:"SSLHost,omitempty" yaml:"SSLHost,omitempty"` // SSLProxyHeaders is set of header keys with associated values that would indicate a valid https request. Useful when using Nginx: `map[string]string{"X-Forwarded-Proto": "https"}`. Default is blank map. SSLProxyHeaders map[string]string `json:"SSLProxyHeaders,omitempty" yaml:"SSLProxyHeaders,omitempty"` // If SSLRedirect is set to true, then only allow https requests. Default is false. SSLRedirect bool `json:"SSLRedirect,omitempty" yaml:"SSLRedirect,omitempty"` // If SSLTemporaryRedirect is true, the a 302 will be used while redirecting. Default is false (301). SSLTemporaryRedirect bool `json:"SSLTemporaryRedirect,omitempty" yaml:"SSLTemporaryRedirect,omitempty"` // If STSIncludeSubdomains is set to true, the `includeSubdomains` will be appended to the Strict-Transport-Security header. Default is false. STSIncludeSubdomains bool `json:"STSIncludeSubdomains,omitempty" yaml:"STSIncludeSubdomains,omitempty"` // If STSPreload is set to true, the `preload` flag will be appended to the Strict-Transport-Security header. Default is false. STSPreload bool `json:"STSPreload,omitempty" yaml:"STSPreload,omitempty"` // STSSeconds is the max-age of the Strict-Transport-Security header. Default is 0, which would NOT include the header. STSSeconds int64 `json:"STSSeconds,omitempty" yaml:"STSSeconds,omitempty"` // SecureContextKey allows a custom key to be specified for context storage. SecureContextKey string `json:"SecureContextKey,omitempty" yaml:"SecureContextKey,omitempty"` }
SecureOptions nolint
swagger:model SecureOptions
func (*SecureOptions) ContextValidate ¶
ContextValidate validates this secure options based on context it is used
func (*SecureOptions) MarshalBinary ¶
func (m *SecureOptions) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SecureOptions) UnmarshalBinary ¶
func (m *SecureOptions) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Server ¶
type Server struct { // Access token strategy // // You can choose to go either with `JWT` or `opaque` tokens. // // The content of JSON Web Tokens is readable and it is possible to be decoded by anyone that // has a secret or a public key in their possession. // // Opaque tokens are in a proprietary form that contains an identifier to information stored on // the athorization server. To validate an opaque token, the recipient must call the server that // issued the token. // Example: jwt // Enum: ["jwt","opaque"] AccessTokenStrategy string `json:"access_token_strategy,omitempty" yaml:"access_token_strategy,omitempty"` // Access token time to live // // After an access token reaches its time to live, it expires and it cannot be used to // authenticate the client application. // Example: 1h10m30s // Format: duration AccessTokenTTL strfmt.Duration `json:"access_token_ttl,omitempty" yaml:"access_token_ttl,omitempty"` // advanced Advanced *AdvancedConfiguration `json:"advanced,omitempty" yaml:"advanced,omitempty"` // authentication context settings AuthenticationContextSettings *AuthenticationContextSettings `json:"authentication_context_settings,omitempty" yaml:"authentication_context_settings,omitempty"` // allowed authentication mechanisms for users in the identity pools // Example: ["password","totp","otp","webauthn"] AuthenticationMechanisms []string `json:"authentication_mechanisms" yaml:"authentication_mechanisms"` // Authorization code time to live // // After an authorization code reaches its time to live, it expires and it cannot be used to // authorize the request to the `/token` endpoint. // Example: 10m0s // Format: duration AuthorizationCodeTTL strfmt.Duration `json:"authorization_code_ttl,omitempty" yaml:"authorization_code_ttl,omitempty"` // backchannel token delivery modes supported BackchannelTokenDeliveryModesSupported []string `json:"backchannel_token_delivery_modes_supported" yaml:"backchannel_token_delivery_modes_supported"` // backchannel user code parameter supported BackchannelUserCodeParameterSupported bool `json:"backchannel_user_code_parameter_supported,omitempty" yaml:"backchannel_user_code_parameter_supported,omitempty"` // cdr Cdr *CDRConfiguration `json:"cdr,omitempty" yaml:"cdr,omitempty"` // Your server's label color in a HEX format. // Example: #007FFF Color string `json:"color,omitempty" yaml:"color,omitempty"` // Namespace used when creating Open Banking Brasil consent IDs // // Consent IDs will have the form of urn:<consent_id_namespace>:<uid> when this is set. // If this is empty, the tenant id is used by default ConsentIDNamespace string `json:"consent_id_namespace,omitempty" yaml:"consent_id_namespace,omitempty"` // Cookie max age // // Defines how long a cookie can live until it expires. // Example: 1h10m30s // Format: duration CookieMaxAge strfmt.Duration `json:"cookie_max_age,omitempty" yaml:"cookie_max_age,omitempty"` // Defines a custom issuer URL that can be used as the value of the `iss` claim in an access // token. // // If not provided, it is built dynamically based on the server's URL. // Example: http://example.com/default/default CustomIssuerURL string `json:"custom_issuer_url,omitempty" yaml:"custom_issuer_url,omitempty"` // Display description of the workspace // Example: Server description Description string `json:"description,omitempty" yaml:"description,omitempty"` // device authorization DeviceAuthorization *DeviceAuthorizationConfiguration `json:"device_authorization,omitempty" yaml:"device_authorization,omitempty"` // dynamic client registration DynamicClientRegistration *DynamicClientRegistrationSettings `json:"dynamic_client_registration,omitempty" yaml:"dynamic_client_registration,omitempty"` // You can use this property to define a separator that is used for dynamic scopes. // // For example, the default separator is `.`, so the scope could look like the following: // `users.*`. // // For Open Banking Brazil compliant servers, the `:` separator should be used. DynamicScopeSeparator string `json:"dynamic_scope_separator,omitempty" yaml:"dynamic_scope_separator,omitempty"` // Deprecated: Use IDPDiscovery instead // // If enabled, IDP discovery automatically redirects the user to their own IDP and does not // display IDPs of other users while the users accesses the server/application. // Example: false EnableIdpDiscovery bool `json:"enable_idp_discovery,omitempty" yaml:"enable_idp_discovery,omitempty"` // Deprecated // // If enabled, it is possible to manually register clients withouth the use of software // statements. // // This flag is enabled, when the `enable_trust_anchor` flag is set to `false`. You can disable // it using API, but it cannot be manually enabled. EnableLegacyClientsWithNoSoftwareStatement bool `` /* 131-byte string literal not displayed */ // If enabled, the server is visible on the Quick Access tab on the login page. EnableQuickAccess bool `json:"enable_quick_access,omitempty" yaml:"enable_quick_access,omitempty"` // If enabled, it makes it obligatory to provide a software statement signed by a trusted certificate authority // // when registering a client application with the use of the Dynamic Client Registration (DCR). // // In public key infrastructure (PKI), trust anchors are certification authorities. They are // represented by a certificate that is used to verify the signature of a certificate issued by // a particular trust anchor. EnableTrustAnchor bool `json:"enable_trust_anchor,omitempty" yaml:"enable_trust_anchor,omitempty"` // When enabled, the authorization server will enforce encrypted id tokens it issues EnforceIDTokenEncryption bool `json:"enforce_id_token_encryption,omitempty" yaml:"enforce_id_token_encryption,omitempty"` // Define whether you want to enforce using the Proof Key of Code Exchange (PKCE) for both // private and public clients. // // PKCE is an OAuth security extension that prevents malicious applications or codes that // intercepted authorization code from exchanging it for an access token. // Example: false EnforcePkce bool `json:"enforce_pkce,omitempty" yaml:"enforce_pkce,omitempty"` // Define whether you want to enforce using the Proof Key of Code Exchange (PKCE) for // public clients. // // Public clients, like mobile applications or JavaScript-based applications, by their design, // cannot store client secrets securely. For such clients, even encrypting the client secret // inside the application’s code is not a reliable way of protecting secrets as the application // can be decompiled and the client secret can be extracted while it is decrypted in the memory // of the application. // // For those reasons, ACP supports the use of PKCE as an addition to the authorization code // grant flow to provide a secure alternative to the implicit grant flow. // Example: false EnforcePkceForPublicClients bool `json:"enforce_pkce_for_public_clients,omitempty" yaml:"enforce_pkce_for_public_clients,omitempty"` // fdx Fdx *FDXConfiguration `json:"fdx,omitempty" yaml:"fdx,omitempty"` // An array that defines which of the OAuth 2.0 grant types are enabled for the authorization server. // Example: ["authorization_code","implicit","refresh_token","client_credentials"] GrantTypes []string `json:"grant_types" yaml:"grant_types"` // Unique identifier of an authorization server (workspace) // // If not provided, a random ID is generated. // Example: default ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID token time to live // // After an ID token reaches its time to live, it expires and it cannot be used to provide // user profile information to a client application. // Example: 1h10m30s // Format: duration IDTokenTTL strfmt.Duration `json:"id_token_ttl,omitempty" yaml:"id_token_ttl,omitempty"` // identity assurance IdentityAssurance *IdentityAssuranceConfiguration `json:"identity_assurance,omitempty" yaml:"identity_assurance,omitempty"` // idp discovery IdpDiscovery *IDPDiscovery `json:"idp_discovery,omitempty" yaml:"idp_discovery,omitempty"` // Issuer ID that will be used to set `iss` claim on signed messages // // If issuer_id is not set then default issuer_url will be used // Example: 5647fe90-f6bc-11eb-9a03-0242ac130003 IssuerID string `json:"issuer_id,omitempty" yaml:"issuer_id,omitempty"` // jwks Jwks *ServerJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"` // Determines which type of asymmetric algorithms (RSA or ECDSA) is used to generate keys for signing access and // ID tokens. // // It is used only as an input parameter for the Create Authorization Server API. // Example: rsa // Enum: ["rsa","ecdsa","ps"] KeyType string `json:"key_type,omitempty" yaml:"key_type,omitempty"` // legal entity LegalEntity *LegalEntity `json:"legal_entity,omitempty" yaml:"legal_entity,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // metadata Metadata *ServerMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // Display name of the workspace // // If not provided, a random ID is generated. // Example: default Name string `json:"name,omitempty" yaml:"name,omitempty"` // obbr Obbr *OBBRConfiguration `json:"obbr,omitempty" yaml:"obbr,omitempty"` // organization Organization *OrganizationConfiguration `json:"organization,omitempty" yaml:"organization,omitempty"` // Optional ID of a parent server ParentID string `json:"parent_id,omitempty" yaml:"parent_id,omitempty"` // The profile of a server // // ACP is delivered with preconfigured workspace templates that enable quick and easy setup for // specific configuration patterns. For example, you can instantly create an Open Banking // compliant workspace that has all of the required mechanisms and settings already in place. // Example: default // Enum: ["default","demo","workforce","consumer","partners","third_party","fapi_advanced","fapi_rw","fapi_ro","openbanking_uk_fapi_advanced","openbanking_uk","openbanking_br","openbanking_br_unico","cdr_australia","cdr_australia_fapi_rw","fdx","openbanking_ksa","fapi_20_security","fapi_20_message_signing","connect_id"] Profile string `json:"profile,omitempty" yaml:"profile,omitempty"` // Custom pushed authentication request TTL // If not provided, TTL is set to 60 seconds. // Format: duration PushedAuthorizationRequestTTL strfmt.Duration `json:"pushed_authorization_request_ttl,omitempty" yaml:"pushed_authorization_request_ttl,omitempty"` // Refresh token time to live // // After a refresh token reaches its time to live, it expires and it cannot be used to obtain // new access tokens for a client application. // Example: 720h0m0s // Format: duration RefreshTokenTTL strfmt.Duration `json:"refresh_token_ttl,omitempty" yaml:"refresh_token_ttl,omitempty"` // Boolean parameter indicating whether the authorization server accepts authorization request data only via PAR. RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"` // response types ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"` // You can provide root Certificate Authority (CA) certificates encoded to the Privacy-Enhanced // Mail (PEM) file format which are used for the `tls_client_auth` and the // `self_signed_tls_client_auth` client authentication methods that use the Mutual // Transport Layer Security (mTLS). // // If not set, the system root CA certifiates are used instead. RootCas string `json:"root_cas,omitempty" yaml:"root_cas,omitempty"` // An array of rotated secrets that are still used to validate tokens // Example: ["jFpwIvuKJP46J71WqszPv1SrzoUr-cSILP9EPdlClB4"] RotatedSecrets []string `json:"rotated_secrets" yaml:"rotated_secrets"` // saml Saml *SAMLConfiguration `json:"saml,omitempty" yaml:"saml,omitempty"` // formats of the scope claim that will be included in the access token // Example: ["scp_array","scope_space_separated"] ScopeClaimFormats []ScopeClaimFormat `json:"scope_claim_formats" yaml:"scope_claim_formats"` // Secret used for hashing // // It must have at least 32 characters. If not provided, it is generated. // Example: hW5WhKX_7w7BLwUQ6mn7Cp70_OoKI_F1y1hLS5U8lIU Secret string `json:"secret,omitempty" yaml:"secret,omitempty"` // settings Settings *ServerSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso Sso *SSOConfiguration `json:"sso,omitempty" yaml:"sso,omitempty"` // styling Styling *Styling `json:"styling,omitempty" yaml:"styling,omitempty"` // Define the format of a subject // When set to hash sub value is a one way hash of idp id and idp sub // Enum: ["hash","legacy"] SubjectFormat string `json:"subject_format,omitempty" yaml:"subject_format,omitempty"` // Salt used to hash `subject` when the `pairwise` subject type is used. // // Salt is a random data which is used as an additional input to one-way functions that hashes // data, passwords, and, in this case, subjects. // // It is recommended that your salt value is long for security reasons. Preferably, the salt // value should be at least the same length as the output of the hash. // // If not provided, it is generated. SubjectIdentifierAlgorithmSalt string `json:"subject_identifier_algorithm_salt,omitempty" yaml:"subject_identifier_algorithm_salt,omitempty"` // An array that defines supported subject identifier types. // // Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer, // and are intended to be consumed by client applications. There are two types // of subject identifiers: `public` and `pairwise`. // // `public` identifiers provide the same `sub` claim value to all client applications. // `pairwise` identifiers provide different `sub` claim values to each client application. With // this approach, it makes it impossible for client applications to correlate the end-user's // activity without their permission. // Example: ["public","pairwise"] SubjectIdentifierTypes []string `json:"subject_identifier_types" yaml:"subject_identifier_types"` // If true this workspace can be used as a template when creating a new ones. Template bool `json:"template,omitempty" yaml:"template,omitempty"` // ID of a tenant // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // An array that lists all of the supported token endpoint authentication methods for the // authorization server. TokenEndpointAuthMethods []string `json:"token_endpoint_auth_methods" yaml:"token_endpoint_auth_methods"` // Token endpoint auth signing supported alg values // // Supported algorithms: HS256, RS256, ES256, PS256 // // At least one algorithm must be set. // // The default values depends on the server security profile. TokenEndpointAuthSigningAlgValues []string `json:"token_endpoint_auth_signing_alg_values" yaml:"token_endpoint_auth_signing_alg_values"` // Deprecated: Use TokenEndpointAuthMethods instead TokenEndpointAuthnMethods []string `json:"token_endpoint_authn_methods" yaml:"token_endpoint_authn_methods"` // trust anchor configuration TrustAnchorConfiguration *TrustAnchorConfiguration `json:"trust_anchor_configuration,omitempty" yaml:"trust_anchor_configuration,omitempty"` // Server type // // It is an internal property used to recognize if the server is created for an admin portal, // a developer portal, or if it is a system or a regular workspace. // Example: regular // Enum: ["admin","developer","system","regular","organization"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // server version to track internal changes // version that is currently the latest: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` }
Server Multi Tenant authorization server
swagger:model Server
func (*Server) ContextValidate ¶
ContextValidate validate this server based on the context it is used
func (*Server) MarshalBinary ¶
MarshalBinary interface implementation
func (*Server) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type ServerAPIs ¶
type ServerAPIs struct { // apis by services ApisByServices map[string][]API `json:"apis_by_services,omitempty" yaml:"apis_by_services,omitempty"` }
ServerAPIs server a p is
swagger:model ServerAPIs
func (*ServerAPIs) ContextValidate ¶
ContextValidate validate this server a p is based on the context it is used
func (*ServerAPIs) MarshalBinary ¶
func (m *ServerAPIs) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServerAPIs) UnmarshalBinary ¶
func (m *ServerAPIs) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServerAuditPayload ¶
type ServerAuditPayload struct { // Access token strategy // // You can choose to go either with `JWT` or `opaque` tokens. // // The content of JSON Web Tokens is readable and it is possible to be decoded by anyone that // has a secret or a public key in their possession. // // Opaque tokens are in a proprietary form that contains an identifier to information stored on // the athorization server. To validate an opaque token, the recipient must call the server that // issued the token. // Example: jwt // Enum: ["jwt","opaque"] AccessTokenStrategy string `json:"access_token_strategy,omitempty" yaml:"access_token_strategy,omitempty"` // Access token time to live // // After an access token reaches its time to live, it expires and it cannot be used to // authenticate the client application. // Example: 1h10m30s // Format: duration AccessTokenTTL strfmt.Duration `json:"access_token_ttl,omitempty" yaml:"access_token_ttl,omitempty"` // advanced Advanced *AdvancedConfiguration `json:"advanced,omitempty" yaml:"advanced,omitempty"` // authentication context settings AuthenticationContextSettings *AuthenticationContextSettings `json:"authentication_context_settings,omitempty" yaml:"authentication_context_settings,omitempty"` // allowed authentication mechanisms for users in the identity pools // Example: ["password","totp","otp","webauthn"] AuthenticationMechanisms []string `json:"authentication_mechanisms" yaml:"authentication_mechanisms"` // Authorization code time to live // // After an authorization code reaches its time to live, it expires and it cannot be used to // authorize the request to the `/token` endpoint. // Example: 10m0s // Format: duration AuthorizationCodeTTL strfmt.Duration `json:"authorization_code_ttl,omitempty" yaml:"authorization_code_ttl,omitempty"` // backchannel token delivery modes supported BackchannelTokenDeliveryModesSupported []string `json:"backchannel_token_delivery_modes_supported" yaml:"backchannel_token_delivery_modes_supported"` // backchannel user code parameter supported BackchannelUserCodeParameterSupported bool `json:"backchannel_user_code_parameter_supported,omitempty" yaml:"backchannel_user_code_parameter_supported,omitempty"` // cdr Cdr *CDRConfiguration `json:"cdr,omitempty" yaml:"cdr,omitempty"` // Your server's label color in a HEX format. // Example: #007FFF Color string `json:"color,omitempty" yaml:"color,omitempty"` // Namespace used when creating Open Banking Brasil consent IDs // // Consent IDs will have the form of urn:<consent_id_namespace>:<uid> when this is set. // If this is empty, the tenant id is used by default ConsentIDNamespace string `json:"consent_id_namespace,omitempty" yaml:"consent_id_namespace,omitempty"` // Cookie max age // // Defines how long a cookie can live until it expires. // Example: 1h10m30s // Format: duration CookieMaxAge strfmt.Duration `json:"cookie_max_age,omitempty" yaml:"cookie_max_age,omitempty"` // Defines a custom issuer URL that can be used as the value of the `iss` claim in an access // token. // // If not provided, it is built dynamically based on the server's URL. // Example: http://example.com/default/default CustomIssuerURL string `json:"custom_issuer_url,omitempty" yaml:"custom_issuer_url,omitempty"` // Display description of the workspace // Example: Server description Description string `json:"description,omitempty" yaml:"description,omitempty"` // device authorization DeviceAuthorization *DeviceAuthorizationConfiguration `json:"device_authorization,omitempty" yaml:"device_authorization,omitempty"` // dynamic client registration DynamicClientRegistration *DynamicClientRegistrationSettings `json:"dynamic_client_registration,omitempty" yaml:"dynamic_client_registration,omitempty"` // You can use this property to define a separator that is used for dynamic scopes. // // For example, the default separator is `.`, so the scope could look like the following: // `users.*`. // // For Open Banking Brazil compliant servers, the `:` separator should be used. DynamicScopeSeparator string `json:"dynamic_scope_separator,omitempty" yaml:"dynamic_scope_separator,omitempty"` // Deprecated: Use IDPDiscovery instead // // If enabled, IDP discovery automatically redirects the user to their own IDP and does not // display IDPs of other users while the users accesses the server/application. // Example: false EnableIdpDiscovery bool `json:"enable_idp_discovery,omitempty" yaml:"enable_idp_discovery,omitempty"` // Deprecated // // If enabled, it is possible to manually register clients withouth the use of software // statements. // // This flag is enabled, when the `enable_trust_anchor` flag is set to `false`. You can disable // it using API, but it cannot be manually enabled. EnableLegacyClientsWithNoSoftwareStatement bool `` /* 131-byte string literal not displayed */ // If enabled, the server is visible on the Quick Access tab on the login page. EnableQuickAccess bool `json:"enable_quick_access,omitempty" yaml:"enable_quick_access,omitempty"` // If enabled, it makes it obligatory to provide a software statement signed by a trusted certificate authority // // when registering a client application with the use of the Dynamic Client Registration (DCR). // // In public key infrastructure (PKI), trust anchors are certification authorities. They are // represented by a certificate that is used to verify the signature of a certificate issued by // a particular trust anchor. EnableTrustAnchor bool `json:"enable_trust_anchor,omitempty" yaml:"enable_trust_anchor,omitempty"` // When enabled, the authorization server will enforce encrypted id tokens it issues EnforceIDTokenEncryption bool `json:"enforce_id_token_encryption,omitempty" yaml:"enforce_id_token_encryption,omitempty"` // Define whether you want to enforce using the Proof Key of Code Exchange (PKCE) for both // private and public clients. // // PKCE is an OAuth security extension that prevents malicious applications or codes that // intercepted authorization code from exchanging it for an access token. // Example: false EnforcePkce bool `json:"enforce_pkce,omitempty" yaml:"enforce_pkce,omitempty"` // Define whether you want to enforce using the Proof Key of Code Exchange (PKCE) for // public clients. // // Public clients, like mobile applications or JavaScript-based applications, by their design, // cannot store client secrets securely. For such clients, even encrypting the client secret // inside the application’s code is not a reliable way of protecting secrets as the application // can be decompiled and the client secret can be extracted while it is decrypted in the memory // of the application. // // For those reasons, ACP supports the use of PKCE as an addition to the authorization code // grant flow to provide a secure alternative to the implicit grant flow. // Example: false EnforcePkceForPublicClients bool `json:"enforce_pkce_for_public_clients,omitempty" yaml:"enforce_pkce_for_public_clients,omitempty"` // fdx Fdx *FDXConfiguration `json:"fdx,omitempty" yaml:"fdx,omitempty"` // An array that defines which of the OAuth 2.0 grant types are enabled for the authorization server. // Example: ["authorization_code","implicit","refresh_token","client_credentials"] GrantTypes []string `json:"grant_types" yaml:"grant_types"` // Unique identifier of an authorization server (workspace) // // If not provided, a random ID is generated. // Example: default ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID token time to live // // After an ID token reaches its time to live, it expires and it cannot be used to provide // user profile information to a client application. // Example: 1h10m30s // Format: duration IDTokenTTL strfmt.Duration `json:"id_token_ttl,omitempty" yaml:"id_token_ttl,omitempty"` // identity assurance IdentityAssurance *IdentityAssuranceConfiguration `json:"identity_assurance,omitempty" yaml:"identity_assurance,omitempty"` // idp discovery IdpDiscovery *IDPDiscovery `json:"idp_discovery,omitempty" yaml:"idp_discovery,omitempty"` // Issuer ID that will be used to set `iss` claim on signed messages // // If issuer_id is not set then default issuer_url will be used // Example: 5647fe90-f6bc-11eb-9a03-0242ac130003 IssuerID string `json:"issuer_id,omitempty" yaml:"issuer_id,omitempty"` // Determines which type of asymmetric algorithms (RSA or ECDSA) is used to generate keys for signing access and // ID tokens. // // It is used only as an input parameter for the Create Authorization Server API. // Example: rsa // Enum: ["rsa","ecdsa","ps"] KeyType string `json:"key_type,omitempty" yaml:"key_type,omitempty"` // legal entity LegalEntity *LegalEntity `json:"legal_entity,omitempty" yaml:"legal_entity,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // metadata Metadata *ServerMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // Display name of the workspace // // If not provided, a random ID is generated. // Example: default Name string `json:"name,omitempty" yaml:"name,omitempty"` // obbr Obbr *OBBRConfiguration `json:"obbr,omitempty" yaml:"obbr,omitempty"` // organization Organization *OrganizationConfiguration `json:"organization,omitempty" yaml:"organization,omitempty"` // Optional ID of a parent server ParentID string `json:"parent_id,omitempty" yaml:"parent_id,omitempty"` // The profile of a server // // ACP is delivered with preconfigured workspace templates that enable quick and easy setup for // specific configuration patterns. For example, you can instantly create an Open Banking // compliant workspace that has all of the required mechanisms and settings already in place. // Example: default // Enum: ["default","demo","workforce","consumer","partners","third_party","fapi_advanced","fapi_rw","fapi_ro","openbanking_uk_fapi_advanced","openbanking_uk","openbanking_br","openbanking_br_unico","cdr_australia","cdr_australia_fapi_rw","fdx","openbanking_ksa","fapi_20_security","fapi_20_message_signing","connect_id"] Profile string `json:"profile,omitempty" yaml:"profile,omitempty"` // Custom pushed authentication request TTL // If not provided, TTL is set to 60 seconds. // Format: duration PushedAuthorizationRequestTTL strfmt.Duration `json:"pushed_authorization_request_ttl,omitempty" yaml:"pushed_authorization_request_ttl,omitempty"` // Refresh token time to live // // After a refresh token reaches its time to live, it expires and it cannot be used to obtain // new access tokens for a client application. // Example: 720h0m0s // Format: duration RefreshTokenTTL strfmt.Duration `json:"refresh_token_ttl,omitempty" yaml:"refresh_token_ttl,omitempty"` // Boolean parameter indicating whether the authorization server accepts authorization request data only via PAR. RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"` // response types ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"` // saml Saml *SAMLConfiguration `json:"saml,omitempty" yaml:"saml,omitempty"` // formats of the scope claim that will be included in the access token // Example: ["scp_array","scope_space_separated"] ScopeClaimFormats []ScopeClaimFormat `json:"scope_claim_formats" yaml:"scope_claim_formats"` // settings Settings *ServerSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso Sso *SSOConfiguration `json:"sso,omitempty" yaml:"sso,omitempty"` // styling Styling *Styling `json:"styling,omitempty" yaml:"styling,omitempty"` // Define the format of a subject // When set to hash sub value is a one way hash of idp id and idp sub // Enum: ["hash","legacy"] SubjectFormat string `json:"subject_format,omitempty" yaml:"subject_format,omitempty"` // An array that defines supported subject identifier types. // // Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer, // and are intended to be consumed by client applications. There are two types // of subject identifiers: `public` and `pairwise`. // // `public` identifiers provide the same `sub` claim value to all client applications. // `pairwise` identifiers provide different `sub` claim values to each client application. With // this approach, it makes it impossible for client applications to correlate the end-user's // activity without their permission. // Example: ["public","pairwise"] SubjectIdentifierTypes []string `json:"subject_identifier_types" yaml:"subject_identifier_types"` // If true this workspace can be used as a template when creating a new ones. Template bool `json:"template,omitempty" yaml:"template,omitempty"` // ID of a tenant // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // An array that lists all of the supported token endpoint authentication methods for the // authorization server. TokenEndpointAuthMethods []string `json:"token_endpoint_auth_methods" yaml:"token_endpoint_auth_methods"` // Token endpoint auth signing supported alg values // // Supported algorithms: HS256, RS256, ES256, PS256 // // At least one algorithm must be set. // // The default values depends on the server security profile. TokenEndpointAuthSigningAlgValues []string `json:"token_endpoint_auth_signing_alg_values" yaml:"token_endpoint_auth_signing_alg_values"` // Deprecated: Use TokenEndpointAuthMethods instead TokenEndpointAuthnMethods []string `json:"token_endpoint_authn_methods" yaml:"token_endpoint_authn_methods"` // trust anchor configuration TrustAnchorConfiguration *TrustAnchorConfiguration `json:"trust_anchor_configuration,omitempty" yaml:"trust_anchor_configuration,omitempty"` // Server type // // It is an internal property used to recognize if the server is created for an admin portal, // a developer portal, or if it is a system or a regular workspace. // Example: regular // Enum: ["admin","developer","system","regular","organization"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // server version to track internal changes // version that is currently the latest: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` }
ServerAuditPayload server audit payload
swagger:model ServerAuditPayload
func (*ServerAuditPayload) ContextValidate ¶
ContextValidate validate this server audit payload based on the context it is used
func (*ServerAuditPayload) MarshalBinary ¶
func (m *ServerAuditPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServerAuditPayload) UnmarshalBinary ¶
func (m *ServerAuditPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServerBindingResponse ¶
type ServerBindingResponse struct { // Your server's label color in a HEX format. // Example: #007FFF Color string `json:"color,omitempty" yaml:"color,omitempty"` // dependent server id // Example: default Dependent string `json:"dependent,omitempty" yaml:"dependent,omitempty"` // dependent server DependentServer *ServerInfo `json:"dependent_server,omitempty" yaml:"dependent_server,omitempty"` // Display description of the workspace // Example: Server description Description string `json:"description,omitempty" yaml:"description,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // Display name of the workspace // // If not provided, a random ID is generated. // Example: default Name string `json:"name,omitempty" yaml:"name,omitempty"` // The profile of a server // // ACP is delivered with preconfigured workspace templates that enable quick and easy setup for // specific configuration patterns. For example, you can instantly create an Open Banking // compliant workspace that has all of the required mechanisms and settings already in place. // Example: default // Enum: ["default","demo","workforce","consumer","partners","third_party","fapi_advanced","fapi_rw","fapi_ro","openbanking_uk_fapi_advanced","openbanking_uk","openbanking_br","openbanking_br_unico","cdr_australia","cdr_australia_fapi_rw","fdx","openbanking_ksa","fapi_20_security","fapi_20_message_signing","connect_id"] Profile string `json:"profile,omitempty" yaml:"profile,omitempty"` // authorization server id // Example: developer ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // tenant id // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // Server type // // It is an internal property used to recognize if the server is created for an admin portal, // a developer portal, or if it is a system or a regular workspace. // Example: regular // Enum: ["admin","developer","system","regular","organization"] Type string `json:"type,omitempty" yaml:"type,omitempty"` }
ServerBindingResponse server binding response
swagger:model ServerBindingResponse
func (*ServerBindingResponse) ContextValidate ¶
ContextValidate validate this server binding response based on the context it is used
func (*ServerBindingResponse) MarshalBinary ¶
func (m *ServerBindingResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServerBindingResponse) UnmarshalBinary ¶
func (m *ServerBindingResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServerConsent ¶
type ServerConsent struct { // client id ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // custom Custom *CustomServerConsent `json:"custom,omitempty" yaml:"custom,omitempty"` // oidc Oidc OIDCServerConsent `json:"oidc,omitempty" yaml:"oidc,omitempty"` // openbanking Openbanking *OpenbankingServerConsent `json:"openbanking,omitempty" yaml:"openbanking,omitempty"` // server id ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type Type string `json:"type,omitempty" yaml:"type,omitempty"` }
ServerConsent server consent
swagger:model ServerConsent
func (*ServerConsent) ContextValidate ¶
ContextValidate validate this server consent based on the context it is used
func (*ServerConsent) MarshalBinary ¶
func (m *ServerConsent) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServerConsent) UnmarshalBinary ¶
func (m *ServerConsent) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServerConsentResponse ¶
type ServerConsentResponse struct { // client Client *ClientAdminResponse `json:"client,omitempty" yaml:"client,omitempty"` // client id ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // custom Custom *CustomServerConsent `json:"custom,omitempty" yaml:"custom,omitempty"` // oidc Oidc OIDCServerConsent `json:"oidc,omitempty" yaml:"oidc,omitempty"` // openbanking Openbanking *OpenbankingServerConsent `json:"openbanking,omitempty" yaml:"openbanking,omitempty"` // server id ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type Type string `json:"type,omitempty" yaml:"type,omitempty"` }
ServerConsentResponse server consent response
swagger:model ServerConsentResponse
func (*ServerConsentResponse) ContextValidate ¶
ContextValidate validate this server consent response based on the context it is used
func (*ServerConsentResponse) MarshalBinary ¶
func (m *ServerConsentResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServerConsentResponse) UnmarshalBinary ¶
func (m *ServerConsentResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServerInfo ¶
type ServerInfo struct { // Your server's label color in a HEX format. // Example: #007FFF Color string `json:"color,omitempty" yaml:"color,omitempty"` // Display description of the workspace // Example: Server description Description string `json:"description,omitempty" yaml:"description,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // Display name of the workspace // // If not provided, a random ID is generated. // Example: default Name string `json:"name,omitempty" yaml:"name,omitempty"` // The profile of a server // // ACP is delivered with preconfigured workspace templates that enable quick and easy setup for // specific configuration patterns. For example, you can instantly create an Open Banking // compliant workspace that has all of the required mechanisms and settings already in place. // Example: default // Enum: ["default","demo","workforce","consumer","partners","third_party","fapi_advanced","fapi_rw","fapi_ro","openbanking_uk_fapi_advanced","openbanking_uk","openbanking_br","openbanking_br_unico","cdr_australia","cdr_australia_fapi_rw","fdx","openbanking_ksa","fapi_20_security","fapi_20_message_signing","connect_id"] Profile string `json:"profile,omitempty" yaml:"profile,omitempty"` // Server type // // It is an internal property used to recognize if the server is created for an admin portal, // a developer portal, or if it is a system or a regular workspace. // Example: regular // Enum: ["admin","developer","system","regular","organization"] Type string `json:"type,omitempty" yaml:"type,omitempty"` }
ServerInfo server info
swagger:model ServerInfo
func (*ServerInfo) ContextValidate ¶
ContextValidate validates this server info based on context it is used
func (*ServerInfo) MarshalBinary ¶
func (m *ServerInfo) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServerInfo) UnmarshalBinary ¶
func (m *ServerInfo) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServerJWK ¶
type ServerJWK struct { // The "alg" (algorithm) parameter identifies the algorithm intended for // use with the key. The values used should either be registered in the // IANA "JSON Web Signature and Encryption Algorithms" registry // established by [JWA] or be a value that contains a Collision- // Resistant Name. // Example: RS256 Alg string `json:"alg,omitempty" yaml:"alg,omitempty"` // Time when key was generated // Format: date-time CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"` // crv // Example: P-256 Crv string `json:"crv,omitempty" yaml:"crv,omitempty"` // d // Example: T_N8I-6He3M8a7X1vWt6TGIx4xB_GP3Mb4SsZSA4v-orvJzzRiQhLlRR81naWYxfQAYt5isDI6_C2L9bdWo4FFPjGQFvNoRX-_sBJyBI_rl-TBgsZYoUlAj3J92WmY2inbA-PwyJfsaIIDceYBC-eX-xiCu6qMqkZi3MwQAFL6bMdPEM0z4JBcwFT3VdiWAIRUuACWQwrXMq672x7fMuaIaHi7XDGgt1ith23CLfaREmJku9PQcchbt_uEY-hqrFY6ntTtS4paWWQj86xLL94S-Tf6v6xkL918PfLSOTq6XCzxvlFwzBJqApnAhbwqLjpPhgUG04EDRrqrSBc5Y1BLevn6Ip5h1AhessBp3wLkQgz_roeckt-ybvzKTjESMuagnpqLvOT7Y9veIug2MwPJZI2VjczRc1vzMs25XrFQ8DpUy-bNdp89TmvAXwctUMiJdgHloJw23Cv03gIUAkDnsTqZmkpbIf-crpgNKFmQP_EDKoe8p_PXZZgfbRri3NoEVGP7Mk6yEu8LjJhClhZaBNjuWw2-KlBfOA3g79mhfBnkInee5KO9mGR50qPk1V-MorUYNTFMZIm0kFE6eYVWFBwJHLKYhHU34DoiK1VP-svZpC2uAMFNA_UJEwM9CQ2b8qe4-5e9aywMvwcuArRkAB5mBIfOaOJao3mfukKAE D string `json:"d,omitempty" yaml:"d,omitempty"` // dp // Example: G4sPXkc6Ya9y8oJW9_ILj4xuppu0lzi_H7VTkS8xj5SdX3coE0oimYwxIi2emTAue0UOa5dpgFGyBJ4c8tQ2VF402XRugKDTP8akYhFo5tAA77Qe_NmtuYZc3C3m3I24G2GvR5sSDxUyAN2zq8Lfn9EUms6rY3Ob8YeiKkTiBj0 Dp string `json:"dp,omitempty" yaml:"dp,omitempty"` // dq // Example: s9lAH9fggBsoFR8Oac2R_E2gw282rT2kGOAhvIllETE1efrA6huUUvMfBcMpn8lqeW6vzznYY5SSQF7pMdC_agI3nG8Ibp1BUb0JUiraRNqUfLhcQb_d9GF4Dh7e74WbRsobRonujTYN1xCaP6TO61jvWrX-L18txXw494Q_cgk Dq string `json:"dq,omitempty" yaml:"dq,omitempty"` // e // Example: AQAB E string `json:"e,omitempty" yaml:"e,omitempty"` // k // Example: GawgguFyGrWKav7AX4VKUg K string `json:"k,omitempty" yaml:"k,omitempty"` // The "kid" (key ID) parameter is used to match a specific key. This // is used, for instance, to choose among a set of keys within a JWK Set // during key rollover. The structure of the "kid" value is // unspecified. When "kid" values are used within a JWK Set, different // keys within the JWK Set SHOULD use distinct "kid" values. (One // example in which different keys might use the same "kid" value is if // they have different "kty" (key type) values but are considered to be // equivalent alternatives by the application using them.) The "kid" // value is a case-sensitive string. // Example: 1603dfe0af8f4596 Kid string `json:"kid,omitempty" yaml:"kid,omitempty"` // The "kty" (key type) parameter identifies the cryptographic algorithm // family used with the key, such as "RSA" or "EC". "kty" values should // either be registered in the IANA "JSON Web Key Types" registry // established by [JWA] or be a value that contains a Collision- // Resistant Name. The "kty" value is a case-sensitive string. // Example: RSA // Required: true Kty string `json:"kty" yaml:"kty"` // n // Example: vTqrxUyQPl_20aqf5kXHwDZrel-KovIp8s7ewJod2EXHl8tWlRB3_Rem34KwBfqlKQGp1nqah-51H4Jzruqe0cFP58hPEIt6WqrvnmJCXxnNuIB53iX_uUUXXHDHBeaPCSRoNJzNysjoJ30TIUsKBiirhBa7f235PXbKiHducLevV6PcKxJ5cY8zO286qJLBWSPm-OIevwqsIsSIH44Qtm9sioFikhkbLwoqwWORGAY0nl6XvVOlhADdLjBSqSAeT1FPuCDCnXwzCDR8N9IFB_IjdStFkC-rVt2K5BYfPd0c3yFp_vHR15eRd0zJ8XQ7woBC8Vnsac6Et1pKS59pX6256DPWu8UDdEOolKAPgcd_g2NpA76cAaF_jcT80j9KrEzw8Tv0nJBGesuCjPNjGs_KzdkWTUXt23Hn9QJsdc1MZuaW0iqXBepHYfYoqNelzVte117t4BwVp0kUM6we0IqyXClaZgOI8S-WDBw2_Ovdm8e5NmhYAblEVoygcX8Y46oH6bKiaCQfKCFDMcRgChme7AoE1yZZYsPbaG_3IjPrC4LBMHQw8rM9dWjJ8ImjicvZ1pAm0dx-KHCP3y5PVKrxBDf1zSOsBRkOSjB8TPODnJMz6-jd5hTtZxpZPwPoIdCanTZ3ZD6uRBpTmDwtpRGm63UQs1m5FWPwb0T2IF0 N string `json:"n,omitempty" yaml:"n,omitempty"` // p // Example: 6NbkXwDWUhi-eR55Cgbf27FkQDDWIamOaDr0rj1q0f1fFEz1W5A_09YvG09Fiv1AO2-D8Rl8gS1Vkz2i0zCSqnyy8A025XOcRviOMK7nIxE4OH_PEsko8dtIrb3TmE2hUXvCkmzw9EsTF1LQBOGC6iusLTXepIC1x9ukCKFZQvdgtEObQ5kzd9Nhq-cdqmSeMVLoxPLd1blviVT9Vm8-y12CtYpeJHOaIDtVPLlBhJiBoPKWg3vxSm4XxIliNOefqegIlsmTIa3MpS6WWlCK3yHhat0Q-rRxDxdyiVdG_wzJvp0Iw_2wms7pe-PgNPYvUWH9JphWP5K38YqEBiJFXQ P string `json:"p,omitempty" yaml:"p,omitempty"` // Time when key was set as current key in use // Format: date-time PromotedAt strfmt.DateTime `json:"promoted_at,omitempty" yaml:"promoted_at,omitempty"` // q // Example: 0A1FmpOWR91_RAWpqreWSavNaZb9nXeKiBo0DQGBz32DbqKqQ8S4aBJmbRhJcctjCLjain-ivut477tAUMmzJwVJDDq2MZFwC9Q-4VYZmFU4HJityQuSzHYe64RjN-E_NQ02TWhG3QGW6roq6c57c99rrUsETwJJiwS8M5p15Miuz53DaOjv-uqqFAFfywN5WkxHbraBcjHtMiQuyQbQqkCFh-oanHkwYNeytsNhTu2mQmwR5DR2roZ2nPiFjC6nsdk-A7E3S3wMzYYFw7jvbWWoYWo9vB40_MY2Y0FYQSqcDzcBIcq_0tnnasf3VW4Fdx6m80RzOb2Fsnln7vKXAQ Q string `json:"q,omitempty" yaml:"q,omitempty"` // qi // Example: GyM_p6JrXySiz1toFgKbWV-JdI3jQ4ypu9rbMWx3rQJBfmt0FoYzgUIZEVFEcOqwemRN81zoDAaa-Bk0KWNGDjJHZDdDmFhW3AN7lI-puxk_mHZGJ11rxyR8O55XLSe3SPmRfKwZI6yU24ZxvQKFYItdldUKGzO6Ia6zTKhAVRU Qi string `json:"qi,omitempty" yaml:"qi,omitempty"` // Time when key was revoked // Format: date-time RevokedAt strfmt.DateTime `json:"revoked_at,omitempty" yaml:"revoked_at,omitempty"` // Time when key was rotated // Format: date-time RotatedAt strfmt.DateTime `json:"rotated_at,omitempty" yaml:"rotated_at,omitempty"` // Use ("public key use") identifies the intended use of // the public key. The "use" parameter is employed to indicate whether // a public key is used for encrypting data or verifying the signature // on data. Values are commonly "sig" (signature) or "enc" (encryption). // Example: sig Use string `json:"use,omitempty" yaml:"use,omitempty"` // x // Example: f83OJ3D2xF1Bg8vub9tLe1gHMzV76e8Tus9uPHvRVEU X string `json:"x,omitempty" yaml:"x,omitempty"` // The "x5c" (X.509 certificate chain) parameter contains a chain of one // or more PKIX certificates [RFC5280]. The certificate chain is // represented as a JSON array of certificate value strings. Each // string in the array is a base64-encoded (Section 4 of [RFC4648] -- // not base64url-encoded) DER [ITU.X690.1994] PKIX certificate value. // The PKIX certificate containing the key value MUST be the first // certificate. X5c []string `json:"x5c" yaml:"x5c"` // x5t // Example: GawgguFyGrWKav7AX4VKUg X5t string `json:"x5t,omitempty" yaml:"x5t,omitempty"` // x5t s256 // Example: GawgguFyGrWKav7AX4VKUg X5tS256 string `json:"x5t#S256,omitempty" yaml:"x5t#S256,omitempty"` // y // Example: x_FEzRu9m36HLN_tue659LNpXW6pCyStikYjKIWI5a0 Y string `json:"y,omitempty" yaml:"y,omitempty"` }
ServerJWK server j w k
swagger:model ServerJWK
func (*ServerJWK) ContextValidate ¶
ContextValidate validates this server j w k based on context it is used
func (*ServerJWK) MarshalBinary ¶
MarshalBinary interface implementation
func (*ServerJWK) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type ServerJWKs ¶
type ServerJWKs struct { // keys // Example: [] Keys []*ServerJWK `json:"keys" yaml:"keys"` // next encryption key NextEncryptionKey *ServerJWK `json:"next_encryption_key,omitempty" yaml:"next_encryption_key,omitempty"` // next signing key NextSigningKey *ServerJWK `json:"next_signing_key,omitempty" yaml:"next_signing_key,omitempty"` // An array of revoked encryption keys // // Revoked encryption keys cannot be used to encrypt payloads between servers and client applications RevokedEncryptionKeys []*ServerJWK `json:"revoked_encryption_keys" yaml:"revoked_encryption_keys"` // The maximum number of revoked keys that ACP stores. RevokedKeysLimit int64 `json:"revoked_keys_limit,omitempty" yaml:"revoked_keys_limit,omitempty"` // An array of revoked sigining keys // // Revoked signing keys cannot be used to sign any tokens. // Any attempt to authenticate using a token signed with a revoked signing key results // in failed authentication. RevokedSigningKeys []*ServerJWK `json:"revoked_signing_keys" yaml:"revoked_signing_keys"` // The maximum number of rotated keys that ACP stores. RotatedKeysLimit int64 `json:"rotated_keys_limit,omitempty" yaml:"rotated_keys_limit,omitempty"` }
ServerJWKs server j w ks
swagger:model ServerJWKs
func (*ServerJWKs) ContextValidate ¶
ContextValidate validate this server j w ks based on the context it is used
func (*ServerJWKs) MarshalBinary ¶
func (m *ServerJWKs) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServerJWKs) UnmarshalBinary ¶
func (m *ServerJWKs) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServerMetadata ¶
type ServerMetadata struct { // metadata payload Payload map[string]interface{} `json:"payload,omitempty" yaml:"payload,omitempty"` // schema Schema *SupportedJSONSchema `json:"schema,omitempty" yaml:"schema,omitempty"` }
ServerMetadata server metadata
swagger:model ServerMetadata
func (*ServerMetadata) ContextValidate ¶
ContextValidate validate this server metadata based on the context it is used
func (*ServerMetadata) MarshalBinary ¶
func (m *ServerMetadata) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServerMetadata) UnmarshalBinary ¶
func (m *ServerMetadata) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServerResponse ¶
type ServerResponse struct { // Access token strategy // // You can choose to go either with `JWT` or `opaque` tokens. // // The content of JSON Web Tokens is readable and it is possible to be decoded by anyone that // has a secret or a public key in their possession. // // Opaque tokens are in a proprietary form that contains an identifier to information stored on // the athorization server. To validate an opaque token, the recipient must call the server that // issued the token. // Example: jwt // Enum: ["jwt","opaque"] AccessTokenStrategy string `json:"access_token_strategy,omitempty" yaml:"access_token_strategy,omitempty"` // Access token time to live // // After an access token reaches its time to live, it expires and it cannot be used to // authenticate the client application. // Example: 1h10m30s // Format: duration AccessTokenTTL strfmt.Duration `json:"access_token_ttl,omitempty" yaml:"access_token_ttl,omitempty"` // advanced Advanced *AdvancedConfiguration `json:"advanced,omitempty" yaml:"advanced,omitempty"` // authentication context settings AuthenticationContextSettings *AuthenticationContextSettings `json:"authentication_context_settings,omitempty" yaml:"authentication_context_settings,omitempty"` // allowed authentication mechanisms for users in the identity pools // Example: ["password","totp","otp","webauthn"] AuthenticationMechanisms []string `json:"authentication_mechanisms" yaml:"authentication_mechanisms"` // Authorization code time to live // // After an authorization code reaches its time to live, it expires and it cannot be used to // authorize the request to the `/token` endpoint. // Example: 10m0s // Format: duration AuthorizationCodeTTL strfmt.Duration `json:"authorization_code_ttl,omitempty" yaml:"authorization_code_ttl,omitempty"` // backchannel token delivery modes supported BackchannelTokenDeliveryModesSupported []string `json:"backchannel_token_delivery_modes_supported" yaml:"backchannel_token_delivery_modes_supported"` // backchannel user code parameter supported BackchannelUserCodeParameterSupported bool `json:"backchannel_user_code_parameter_supported,omitempty" yaml:"backchannel_user_code_parameter_supported,omitempty"` // cdr Cdr *CDRConfiguration `json:"cdr,omitempty" yaml:"cdr,omitempty"` // Your server's label color in a HEX format. // Example: #007FFF Color string `json:"color,omitempty" yaml:"color,omitempty"` // Namespace used when creating Open Banking Brasil consent IDs // // Consent IDs will have the form of urn:<consent_id_namespace>:<uid> when this is set. // If this is empty, the tenant id is used by default ConsentIDNamespace string `json:"consent_id_namespace,omitempty" yaml:"consent_id_namespace,omitempty"` // Cookie max age // // Defines how long a cookie can live until it expires. // Example: 1h10m30s // Format: duration CookieMaxAge strfmt.Duration `json:"cookie_max_age,omitempty" yaml:"cookie_max_age,omitempty"` // Defines a custom issuer URL that can be used as the value of the `iss` claim in an access // token. // // If not provided, it is built dynamically based on the server's URL. // Example: http://example.com/default/default CustomIssuerURL string `json:"custom_issuer_url,omitempty" yaml:"custom_issuer_url,omitempty"` // Display description of the workspace // Example: Server description Description string `json:"description,omitempty" yaml:"description,omitempty"` // device authorization DeviceAuthorization *DeviceAuthorizationConfiguration `json:"device_authorization,omitempty" yaml:"device_authorization,omitempty"` // dynamic client registration DynamicClientRegistration *DynamicClientRegistrationSettings `json:"dynamic_client_registration,omitempty" yaml:"dynamic_client_registration,omitempty"` // You can use this property to define a separator that is used for dynamic scopes. // // For example, the default separator is `.`, so the scope could look like the following: // `users.*`. // // For Open Banking Brazil compliant servers, the `:` separator should be used. DynamicScopeSeparator string `json:"dynamic_scope_separator,omitempty" yaml:"dynamic_scope_separator,omitempty"` // Deprecated: Use IDPDiscovery instead // // If enabled, IDP discovery automatically redirects the user to their own IDP and does not // display IDPs of other users while the users accesses the server/application. // Example: false EnableIdpDiscovery bool `json:"enable_idp_discovery,omitempty" yaml:"enable_idp_discovery,omitempty"` // Deprecated // // If enabled, it is possible to manually register clients withouth the use of software // statements. // // This flag is enabled, when the `enable_trust_anchor` flag is set to `false`. You can disable // it using API, but it cannot be manually enabled. EnableLegacyClientsWithNoSoftwareStatement bool `` /* 131-byte string literal not displayed */ // If enabled, the server is visible on the Quick Access tab on the login page. EnableQuickAccess bool `json:"enable_quick_access,omitempty" yaml:"enable_quick_access,omitempty"` // If enabled, it makes it obligatory to provide a software statement signed by a trusted certificate authority // // when registering a client application with the use of the Dynamic Client Registration (DCR). // // In public key infrastructure (PKI), trust anchors are certification authorities. They are // represented by a certificate that is used to verify the signature of a certificate issued by // a particular trust anchor. EnableTrustAnchor bool `json:"enable_trust_anchor,omitempty" yaml:"enable_trust_anchor,omitempty"` // When enabled, the authorization server will enforce encrypted id tokens it issues EnforceIDTokenEncryption bool `json:"enforce_id_token_encryption,omitempty" yaml:"enforce_id_token_encryption,omitempty"` // Define whether you want to enforce using the Proof Key of Code Exchange (PKCE) for both // private and public clients. // // PKCE is an OAuth security extension that prevents malicious applications or codes that // intercepted authorization code from exchanging it for an access token. // Example: false EnforcePkce bool `json:"enforce_pkce,omitempty" yaml:"enforce_pkce,omitempty"` // Define whether you want to enforce using the Proof Key of Code Exchange (PKCE) for // public clients. // // Public clients, like mobile applications or JavaScript-based applications, by their design, // cannot store client secrets securely. For such clients, even encrypting the client secret // inside the application’s code is not a reliable way of protecting secrets as the application // can be decompiled and the client secret can be extracted while it is decrypted in the memory // of the application. // // For those reasons, ACP supports the use of PKCE as an addition to the authorization code // grant flow to provide a secure alternative to the implicit grant flow. // Example: false EnforcePkceForPublicClients bool `json:"enforce_pkce_for_public_clients,omitempty" yaml:"enforce_pkce_for_public_clients,omitempty"` // fdx Fdx *FDXConfiguration `json:"fdx,omitempty" yaml:"fdx,omitempty"` // An array that defines which of the OAuth 2.0 grant types are enabled for the authorization server. // Example: ["authorization_code","implicit","refresh_token","client_credentials"] GrantTypes []string `json:"grant_types" yaml:"grant_types"` // Unique identifier of an authorization server (workspace) // // If not provided, a random ID is generated. // Example: default ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID token time to live // // After an ID token reaches its time to live, it expires and it cannot be used to provide // user profile information to a client application. // Example: 1h10m30s // Format: duration IDTokenTTL strfmt.Duration `json:"id_token_ttl,omitempty" yaml:"id_token_ttl,omitempty"` // identity assurance IdentityAssurance *IdentityAssuranceConfiguration `json:"identity_assurance,omitempty" yaml:"identity_assurance,omitempty"` // idp discovery IdpDiscovery *IDPDiscovery `json:"idp_discovery,omitempty" yaml:"idp_discovery,omitempty"` // Issuer ID that will be used to set `iss` claim on signed messages // // If issuer_id is not set then default issuer_url will be used // Example: 5647fe90-f6bc-11eb-9a03-0242ac130003 IssuerID string `json:"issuer_id,omitempty" yaml:"issuer_id,omitempty"` // issuer url IssuerURL string `json:"issuer_url,omitempty" yaml:"issuer_url,omitempty"` // jwks Jwks *ServerJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"` // Determines which type of asymmetric algorithms (RSA or ECDSA) is used to generate keys for signing access and // ID tokens. // // It is used only as an input parameter for the Create Authorization Server API. // Example: rsa // Enum: ["rsa","ecdsa","ps"] KeyType string `json:"key_type,omitempty" yaml:"key_type,omitempty"` // legal entity LegalEntity *LegalEntity `json:"legal_entity,omitempty" yaml:"legal_entity,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // metadata Metadata *ServerMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // mtls issuer url MtlsIssuerURL string `json:"mtls_issuer_url,omitempty" yaml:"mtls_issuer_url,omitempty"` // Display name of the workspace // // If not provided, a random ID is generated. // Example: default Name string `json:"name,omitempty" yaml:"name,omitempty"` // obbr Obbr *OBBRConfiguration `json:"obbr,omitempty" yaml:"obbr,omitempty"` // organization Organization *OrganizationConfiguration `json:"organization,omitempty" yaml:"organization,omitempty"` // Optional ID of a parent server ParentID string `json:"parent_id,omitempty" yaml:"parent_id,omitempty"` // The profile of a server // // ACP is delivered with preconfigured workspace templates that enable quick and easy setup for // specific configuration patterns. For example, you can instantly create an Open Banking // compliant workspace that has all of the required mechanisms and settings already in place. // Example: default // Enum: ["default","demo","workforce","consumer","partners","third_party","fapi_advanced","fapi_rw","fapi_ro","openbanking_uk_fapi_advanced","openbanking_uk","openbanking_br","openbanking_br_unico","cdr_australia","cdr_australia_fapi_rw","fdx","openbanking_ksa","fapi_20_security","fapi_20_message_signing","connect_id"] Profile string `json:"profile,omitempty" yaml:"profile,omitempty"` // Custom pushed authentication request TTL // If not provided, TTL is set to 60 seconds. // Format: duration PushedAuthorizationRequestTTL strfmt.Duration `json:"pushed_authorization_request_ttl,omitempty" yaml:"pushed_authorization_request_ttl,omitempty"` // Refresh token time to live // // After a refresh token reaches its time to live, it expires and it cannot be used to obtain // new access tokens for a client application. // Example: 720h0m0s // Format: duration RefreshTokenTTL strfmt.Duration `json:"refresh_token_ttl,omitempty" yaml:"refresh_token_ttl,omitempty"` // Boolean parameter indicating whether the authorization server accepts authorization request data only via PAR. RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"` // response types ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"` // You can provide root Certificate Authority (CA) certificates encoded to the Privacy-Enhanced // Mail (PEM) file format which are used for the `tls_client_auth` and the // `self_signed_tls_client_auth` client authentication methods that use the Mutual // Transport Layer Security (mTLS). // // If not set, the system root CA certifiates are used instead. RootCas string `json:"root_cas,omitempty" yaml:"root_cas,omitempty"` // An array of rotated secrets that are still used to validate tokens // Example: ["jFpwIvuKJP46J71WqszPv1SrzoUr-cSILP9EPdlClB4"] RotatedSecrets []string `json:"rotated_secrets" yaml:"rotated_secrets"` // saml Saml *SAMLConfiguration `json:"saml,omitempty" yaml:"saml,omitempty"` // formats of the scope claim that will be included in the access token // Example: ["scp_array","scope_space_separated"] ScopeClaimFormats []ScopeClaimFormat `json:"scope_claim_formats" yaml:"scope_claim_formats"` // Secret used for hashing // // It must have at least 32 characters. If not provided, it is generated. // Example: hW5WhKX_7w7BLwUQ6mn7Cp70_OoKI_F1y1hLS5U8lIU Secret string `json:"secret,omitempty" yaml:"secret,omitempty"` // settings Settings *ServerSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso Sso *SSOConfiguration `json:"sso,omitempty" yaml:"sso,omitempty"` // styling Styling *Styling `json:"styling,omitempty" yaml:"styling,omitempty"` // Define the format of a subject // When set to hash sub value is a one way hash of idp id and idp sub // Enum: ["hash","legacy"] SubjectFormat string `json:"subject_format,omitempty" yaml:"subject_format,omitempty"` // Salt used to hash `subject` when the `pairwise` subject type is used. // // Salt is a random data which is used as an additional input to one-way functions that hashes // data, passwords, and, in this case, subjects. // // It is recommended that your salt value is long for security reasons. Preferably, the salt // value should be at least the same length as the output of the hash. // // If not provided, it is generated. SubjectIdentifierAlgorithmSalt string `json:"subject_identifier_algorithm_salt,omitempty" yaml:"subject_identifier_algorithm_salt,omitempty"` // An array that defines supported subject identifier types. // // Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer, // and are intended to be consumed by client applications. There are two types // of subject identifiers: `public` and `pairwise`. // // `public` identifiers provide the same `sub` claim value to all client applications. // `pairwise` identifiers provide different `sub` claim values to each client application. With // this approach, it makes it impossible for client applications to correlate the end-user's // activity without their permission. // Example: ["public","pairwise"] SubjectIdentifierTypes []string `json:"subject_identifier_types" yaml:"subject_identifier_types"` // supported application purposes // Example: ["single_page","server_web","mobile_desktop","service","legacy"] SupportedApplicationPurposes []string `json:"supported_application_purposes" yaml:"supported_application_purposes"` // If true this workspace can be used as a template when creating a new ones. Template bool `json:"template,omitempty" yaml:"template,omitempty"` // ID of a tenant // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // optional theme id ThemeID string `json:"theme_id,omitempty" yaml:"theme_id,omitempty"` // An array that lists all of the supported token endpoint authentication methods for the // authorization server. TokenEndpointAuthMethods []string `json:"token_endpoint_auth_methods" yaml:"token_endpoint_auth_methods"` // Token endpoint auth signing supported alg values // // Supported algorithms: HS256, RS256, ES256, PS256 // // At least one algorithm must be set. // // The default values depends on the server security profile. TokenEndpointAuthSigningAlgValues []string `json:"token_endpoint_auth_signing_alg_values" yaml:"token_endpoint_auth_signing_alg_values"` // Deprecated: Use TokenEndpointAuthMethods instead TokenEndpointAuthnMethods []string `json:"token_endpoint_authn_methods" yaml:"token_endpoint_authn_methods"` // trust anchor configuration TrustAnchorConfiguration *TrustAnchorConfiguration `json:"trust_anchor_configuration,omitempty" yaml:"trust_anchor_configuration,omitempty"` // Server type // // It is an internal property used to recognize if the server is created for an admin portal, // a developer portal, or if it is a system or a regular workspace. // Example: regular // Enum: ["admin","developer","system","regular","organization"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // server version to track internal changes // version that is currently the latest: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` }
ServerResponse server response
swagger:model ServerResponse
func (*ServerResponse) ContextValidate ¶
ContextValidate validate this server response based on the context it is used
func (*ServerResponse) MarshalBinary ¶
func (m *ServerResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServerResponse) UnmarshalBinary ¶
func (m *ServerResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServerSettings ¶
type ServerSettings struct { // default client id DefaultClientID string `json:"default_client_id,omitempty" yaml:"default_client_id,omitempty"` // default post authn ctx script id DefaultPostAuthnCtxScriptID string `json:"default_post_authn_ctx_script_id,omitempty" yaml:"default_post_authn_ctx_script_id,omitempty"` }
ServerSettings server settings
swagger:model ServerSettings
func (*ServerSettings) ContextValidate ¶
ContextValidate validates this server settings based on context it is used
func (*ServerSettings) MarshalBinary ¶
func (m *ServerSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServerSettings) UnmarshalBinary ¶
func (m *ServerSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServerToServer ¶
type ServerToServer struct { // dependent server id // Example: default Dependent string `json:"dependent,omitempty" yaml:"dependent,omitempty"` // authorization server id // Example: developer ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // tenant id // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` }
ServerToServer server to server
swagger:model ServerToServer
func (*ServerToServer) ContextValidate ¶
ContextValidate validates this server to server based on context it is used
func (*ServerToServer) MarshalBinary ¶
func (m *ServerToServer) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServerToServer) UnmarshalBinary ¶
func (m *ServerToServer) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServerToTheme ¶
type ServerToTheme struct { // authorization server id // Example: developer ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // tenant id // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // theme id // Example: acme ThemeID string `json:"theme_id,omitempty" yaml:"theme_id,omitempty"` }
ServerToTheme server to theme
swagger:model ServerToTheme
func (*ServerToTheme) ContextValidate ¶
ContextValidate validates this server to theme based on context it is used
func (*ServerToTheme) MarshalBinary ¶
func (m *ServerToTheme) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServerToTheme) UnmarshalBinary ¶
func (m *ServerToTheme) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServersBindingsResponse ¶
type ServersBindingsResponse struct { // bindings Bindings []*ServerBindingResponse `json:"bindings" yaml:"bindings"` }
ServersBindingsResponse servers bindings response
swagger:model ServersBindingsResponse
func (*ServersBindingsResponse) ContextValidate ¶
func (m *ServersBindingsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this servers bindings response based on the context it is used
func (*ServersBindingsResponse) MarshalBinary ¶
func (m *ServersBindingsResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServersBindingsResponse) UnmarshalBinary ¶
func (m *ServersBindingsResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServersResponse ¶
type ServersResponse struct { // servers Servers []*ServerResponse `json:"servers" yaml:"servers"` }
ServersResponse servers response
swagger:model ServersResponse
func (*ServersResponse) ContextValidate ¶
ContextValidate validate this servers response based on the context it is used
func (*ServersResponse) MarshalBinary ¶
func (m *ServersResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServersResponse) UnmarshalBinary ¶
func (m *ServersResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Service ¶
type Service struct { // Authorization server identifier // Example: my-server AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Custom service audience // Example: https://api.example.com CustomAudience string `json:"custom_audience,omitempty" yaml:"custom_audience,omitempty"` // Service description // Example: Service description Description string `json:"description,omitempty" yaml:"description,omitempty"` // Gateway identifier // Example: gateway-1 GatewayID string `json:"gateway_id,omitempty" yaml:"gateway_id,omitempty"` // A unique identifier of a service // Example: service-1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // Service name // Example: My service Name string `json:"name,omitempty" yaml:"name,omitempty"` // `true` when the service is a system service // Example: false System bool `json:"system,omitempty" yaml:"system,omitempty"` // Tenant identifier // Example: my-company TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // Service type // Enum: ["oauth2","oidc","system","user","openbanking"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // The date of service update // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"` // `true` when the service has the OpenAPI 3.0 specification WithSpecification bool `json:"with_specification,omitempty" yaml:"with_specification,omitempty"` }
Service service
swagger:model Service
func (*Service) ContextValidate ¶
ContextValidate validates this service based on context it is used
func (*Service) MarshalBinary ¶
MarshalBinary interface implementation
func (*Service) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type ServiceAuditPayload ¶
type ServiceAuditPayload struct { // Custom service audience // Example: https://api.example.com CustomAudience string `json:"custom_audience,omitempty" yaml:"custom_audience,omitempty"` // Service description // Example: Service description Description string `json:"description,omitempty" yaml:"description,omitempty"` // Gateway identifier // Example: gateway-1 GatewayID string `json:"gateway_id,omitempty" yaml:"gateway_id,omitempty"` // A unique identifier of a service // Example: service-1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // Service name // Example: My service Name string `json:"name,omitempty" yaml:"name,omitempty"` // `true` when the service is a system service // Example: false System bool `json:"system,omitempty" yaml:"system,omitempty"` // Service type // Enum: ["oauth2","oidc","system","user","openbanking"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // The date of service update // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"` // `true` when the service has the OpenAPI 3.0 specification WithSpecification bool `json:"with_specification,omitempty" yaml:"with_specification,omitempty"` }
ServiceAuditPayload service audit payload
swagger:model ServiceAuditPayload
func (*ServiceAuditPayload) ContextValidate ¶
ContextValidate validates this service audit payload based on context it is used
func (*ServiceAuditPayload) MarshalBinary ¶
func (m *ServiceAuditPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServiceAuditPayload) UnmarshalBinary ¶
func (m *ServiceAuditPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServiceResponse ¶
type ServiceResponse struct { // audience Audience string `json:"audience,omitempty" yaml:"audience,omitempty"` // Authorization server identifier // Example: my-server AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Custom service audience // Example: https://api.example.com CustomAudience string `json:"custom_audience,omitempty" yaml:"custom_audience,omitempty"` // Service description // Example: Service description Description string `json:"description,omitempty" yaml:"description,omitempty"` // Gateway identifier // Example: gateway-1 GatewayID string `json:"gateway_id,omitempty" yaml:"gateway_id,omitempty"` // A unique identifier of a service // Example: service-1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // Service name // Example: My service Name string `json:"name,omitempty" yaml:"name,omitempty"` // number of apis NumberOfApis int64 `json:"number_of_apis,omitempty" yaml:"number_of_apis,omitempty"` // number of scopes NumberOfScopes int64 `json:"number_of_scopes,omitempty" yaml:"number_of_scopes,omitempty"` // number of subscribers NumberOfSubscribers int64 `json:"number_of_subscribers,omitempty" yaml:"number_of_subscribers,omitempty"` // `true` when the service is a system service // Example: false System bool `json:"system,omitempty" yaml:"system,omitempty"` // Tenant identifier // Example: my-company TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // Service type // Enum: ["oauth2","oidc","system","user","openbanking"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // The date of service update // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"` // `true` when the service has the OpenAPI 3.0 specification WithSpecification bool `json:"with_specification,omitempty" yaml:"with_specification,omitempty"` }
ServiceResponse service response
swagger:model ServiceResponse
func (*ServiceResponse) ContextValidate ¶
ContextValidate validates this service response based on context it is used
func (*ServiceResponse) MarshalBinary ¶
func (m *ServiceResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServiceResponse) UnmarshalBinary ¶
func (m *ServiceResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServiceWithAudience ¶
type ServiceWithAudience struct { // audience Audience string `json:"audience,omitempty" yaml:"audience,omitempty"` // Authorization server identifier // Example: my-server AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Custom service audience // Example: https://api.example.com CustomAudience string `json:"custom_audience,omitempty" yaml:"custom_audience,omitempty"` // Service description // Example: Service description Description string `json:"description,omitempty" yaml:"description,omitempty"` // Gateway identifier // Example: gateway-1 GatewayID string `json:"gateway_id,omitempty" yaml:"gateway_id,omitempty"` // A unique identifier of a service // Example: service-1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // Service name // Example: My service Name string `json:"name,omitempty" yaml:"name,omitempty"` // `true` when the service is a system service // Example: false System bool `json:"system,omitempty" yaml:"system,omitempty"` // Tenant identifier // Example: my-company TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // Service type // Enum: ["oauth2","oidc","system","user","openbanking"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // The date of service update // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"` // `true` when the service has the OpenAPI 3.0 specification WithSpecification bool `json:"with_specification,omitempty" yaml:"with_specification,omitempty"` }
ServiceWithAudience service with audience
swagger:model ServiceWithAudience
func (*ServiceWithAudience) ContextValidate ¶
ContextValidate validates this service with audience based on context it is used
func (*ServiceWithAudience) MarshalBinary ¶
func (m *ServiceWithAudience) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServiceWithAudience) UnmarshalBinary ¶
func (m *ServiceWithAudience) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServiceWithScopesResponse ¶
type ServiceWithScopesResponse struct { // audience Audience string `json:"audience,omitempty" yaml:"audience,omitempty"` // Authorization server identifier // Example: my-server AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Custom service audience // Example: https://api.example.com CustomAudience string `json:"custom_audience,omitempty" yaml:"custom_audience,omitempty"` // Service description // Example: Service description Description string `json:"description,omitempty" yaml:"description,omitempty"` // Gateway identifier // Example: gateway-1 GatewayID string `json:"gateway_id,omitempty" yaml:"gateway_id,omitempty"` // A unique identifier of a service // Example: service-1 ID string `json:"id,omitempty" yaml:"id,omitempty"` // Service name // Example: My service Name string `json:"name,omitempty" yaml:"name,omitempty"` // list of scopes Scopes []*Scope `json:"scopes" yaml:"scopes"` // `true` when the service is a system service // Example: false System bool `json:"system,omitempty" yaml:"system,omitempty"` // Tenant identifier // Example: my-company TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // Service type // Enum: ["oauth2","oidc","system","user","openbanking"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // The date of service update // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"` // `true` when the service has the OpenAPI 3.0 specification WithSpecification bool `json:"with_specification,omitempty" yaml:"with_specification,omitempty"` }
ServiceWithScopesResponse service with scopes response
swagger:model ServiceWithScopesResponse
func (*ServiceWithScopesResponse) ContextValidate ¶
func (m *ServiceWithScopesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this service with scopes response based on the context it is used
func (*ServiceWithScopesResponse) MarshalBinary ¶
func (m *ServiceWithScopesResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServiceWithScopesResponse) UnmarshalBinary ¶
func (m *ServiceWithScopesResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ServicesResponse ¶
type ServicesResponse struct { // services Services []*ServiceResponse `json:"services" yaml:"services"` }
ServicesResponse services response
swagger:model ServicesResponse
func (*ServicesResponse) ContextValidate ¶
ContextValidate validate this services response based on the context it is used
func (*ServicesResponse) MarshalBinary ¶
func (m *ServicesResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ServicesResponse) UnmarshalBinary ¶
func (m *ServicesResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SetBetaFeature ¶
type SetBetaFeature struct { // flag Flag string `json:"flag,omitempty" yaml:"flag,omitempty"` // value Value bool `json:"value,omitempty" yaml:"value,omitempty"` }
SetBetaFeature set beta feature
swagger:model SetBetaFeature
func (*SetBetaFeature) ContextValidate ¶
ContextValidate validates this set beta feature based on context it is used
func (*SetBetaFeature) MarshalBinary ¶
func (m *SetBetaFeature) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SetBetaFeature) UnmarshalBinary ¶
func (m *SetBetaFeature) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SpecVersion ¶
type SpecVersion string
SpecVersion spec version
swagger:model SpecVersion
func (SpecVersion) ContextValidate ¶
ContextValidate validates this spec version based on context it is used
type StaticCredentials ¶
type StaticCredentials struct { // An array of users, their credentials and authentication context. // // The `users` parameter accepts a JSON of user data. You can add multiple users, define their // usernames and passwords. You can also enrich their authentication context. Users []*StaticUser `json:"users" yaml:"users"` }
StaticCredentials Static IDP specific credentials
swagger:model StaticCredentials
func (*StaticCredentials) ContextValidate ¶
ContextValidate validate this static credentials based on the context it is used
func (*StaticCredentials) MarshalBinary ¶
func (m *StaticCredentials) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*StaticCredentials) UnmarshalBinary ¶
func (m *StaticCredentials) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type StaticIDP ¶
type StaticIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // credentials Credentials *StaticCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // settings Settings *StaticSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
StaticIDP static ID p
swagger:model StaticIDP
func (*StaticIDP) ContextValidate ¶
ContextValidate validate this static ID p based on the context it is used
func (*StaticIDP) MarshalBinary ¶
MarshalBinary interface implementation
func (*StaticIDP) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type StaticSettings ¶
type StaticSettings struct { // If enabled, a hint message is displayed Hint bool `json:"hint,omitempty" yaml:"hint,omitempty"` }
StaticSettings Static IDP specific settings
swagger:model StaticSettings
func (*StaticSettings) ContextValidate ¶
ContextValidate validates this static settings based on context it is used
func (*StaticSettings) MarshalBinary ¶
func (m *StaticSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*StaticSettings) UnmarshalBinary ¶
func (m *StaticSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type StaticUser ¶
type StaticUser struct { // additional attributes AdditionalAttributes AuthenticationContext `json:"additional_attributes,omitempty" yaml:"additional_attributes,omitempty"` // authentication context AuthenticationContext AuthenticationContext `json:"authentication_context,omitempty" yaml:"authentication_context,omitempty"` // User's preferred email. Email string `json:"email,omitempty" yaml:"email,omitempty"` // If set to true, indicates that the user's email was verified. EmailVerified bool `json:"email_verified,omitempty" yaml:"email_verified,omitempty"` // User password. // Example: secret Password string `json:"password,omitempty" yaml:"password,omitempty"` // User's preferred phone number PhoneNumber string `json:"phone_number,omitempty" yaml:"phone_number,omitempty"` // If set to true, indicates that the user's phone number was verified. PhoneNumberVerified bool `json:"phone_number_verified,omitempty" yaml:"phone_number_verified,omitempty"` // User login. // Example: peter Username string `json:"username,omitempty" yaml:"username,omitempty"` }
StaticUser static user
swagger:model StaticUser
func (*StaticUser) ContextValidate ¶
ContextValidate validate this static user based on the context it is used
func (*StaticUser) MarshalBinary ¶
func (m *StaticUser) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*StaticUser) UnmarshalBinary ¶
func (m *StaticUser) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Styling ¶
type Styling struct { // colors Colors StylingColors `json:"colors,omitempty" yaml:"colors,omitempty"` // font url FontURL string `json:"font_url,omitempty" yaml:"font_url,omitempty"` // logo size LogoSize string `json:"logo_size,omitempty" yaml:"logo_size,omitempty"` // logo url LogoURL string `json:"logo_url,omitempty" yaml:"logo_url,omitempty"` }
Styling styling
swagger:model Styling
func (*Styling) ContextValidate ¶
ContextValidate validate this styling based on the context it is used
func (*Styling) MarshalBinary ¶
MarshalBinary interface implementation
func (*Styling) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type StylingColors ¶
type StylingColors struct { // background Background string `json:"background,omitempty" yaml:"background,omitempty"` // header Header string `json:"header,omitempty" yaml:"header,omitempty"` // primary Primary string `json:"primary,omitempty" yaml:"primary,omitempty"` }
StylingColors styling colors
swagger:model StylingColors
func (*StylingColors) ContextValidate ¶
ContextValidate validates this styling colors based on context it is used
func (*StylingColors) MarshalBinary ¶
func (m *StylingColors) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*StylingColors) UnmarshalBinary ¶
func (m *StylingColors) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SupportedJSONSchema ¶
type SupportedJSONSchema struct { // additional properties AdditionalProperties bool `json:"additionalProperties,omitempty" yaml:"additionalProperties,omitempty"` // all of AllOf []*SupportedJSONSchema `json:"allOf" yaml:"allOf"` // any of AnyOf []*SupportedJSONSchema `json:"anyOf" yaml:"anyOf"` // const Const string `json:"const,omitempty" yaml:"const,omitempty"` // contains Contains *SupportedJSONSchema `json:"contains,omitempty" yaml:"contains,omitempty"` // dependent required DependentRequired map[string][]string `json:"dependentRequired,omitempty" yaml:"dependentRequired,omitempty"` // dependent schemas DependentSchemas map[string]SupportedJSONSchema `json:"dependentSchemas,omitempty" yaml:"dependentSchemas,omitempty"` // description Description string `json:"description,omitempty" yaml:"description,omitempty"` // else Else *SupportedJSONSchema `json:"else,omitempty" yaml:"else,omitempty"` // enum Enum []string `json:"enum" yaml:"enum"` // exclusive maximum ExclusiveMaximum int64 `json:"exclusiveMaximum,omitempty" yaml:"exclusiveMaximum,omitempty"` // exclusive minimum ExclusiveMinimum int64 `json:"exclusiveMinimum,omitempty" yaml:"exclusiveMinimum,omitempty"` // hidden Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // if If *SupportedJSONSchema `json:"if,omitempty" yaml:"if,omitempty"` // items Items *SupportedJSONSchema `json:"items,omitempty" yaml:"items,omitempty"` // max contains MaxContains int64 `json:"maxContains,omitempty" yaml:"maxContains,omitempty"` // arrays MaxItems int64 `json:"maxItems,omitempty" yaml:"maxItems,omitempty"` // strings MaxLength int64 `json:"maxLength,omitempty" yaml:"maxLength,omitempty"` // objects MaxProperties int64 `json:"maxProperties,omitempty" yaml:"maxProperties,omitempty"` // maximum Maximum int64 `json:"maximum,omitempty" yaml:"maximum,omitempty"` // min contains MinContains int64 `json:"minContains,omitempty" yaml:"minContains,omitempty"` // min items MinItems int64 `json:"minItems,omitempty" yaml:"minItems,omitempty"` // min length MinLength int64 `json:"minLength,omitempty" yaml:"minLength,omitempty"` // min properties MinProperties int64 `json:"minProperties,omitempty" yaml:"minProperties,omitempty"` // minimum Minimum int64 `json:"minimum,omitempty" yaml:"minimum,omitempty"` // numeric MultipleOf int64 `json:"multipleOf,omitempty" yaml:"multipleOf,omitempty"` // not Not *SupportedJSONSchema `json:"not,omitempty" yaml:"not,omitempty"` // one of OneOf []*SupportedJSONSchema `json:"oneOf" yaml:"oneOf"` // pattern Pattern string `json:"pattern,omitempty" yaml:"pattern,omitempty"` // pattern properties PatternProperties map[string]SupportedJSONSchema `json:"patternProperties,omitempty" yaml:"patternProperties,omitempty"` // properties Properties map[string]SupportedJSONSchema `json:"properties,omitempty" yaml:"properties,omitempty"` // property names PropertyNames *SupportedJSONSchema `json:"propertyNames,omitempty" yaml:"propertyNames,omitempty"` // required Required []string `json:"required" yaml:"required"` // then Then *SupportedJSONSchema `json:"then,omitempty" yaml:"then,omitempty"` // title Title string `json:"title,omitempty" yaml:"title,omitempty"` // any Type string `json:"type,omitempty" yaml:"type,omitempty"` // unique items UniqueItems bool `json:"uniqueItems,omitempty" yaml:"uniqueItems,omitempty"` }
SupportedJSONSchema supported JSON schema
swagger:model SupportedJSONSchema
func (*SupportedJSONSchema) ContextValidate ¶
ContextValidate validate this supported JSON schema based on the context it is used
func (*SupportedJSONSchema) MarshalBinary ¶
func (m *SupportedJSONSchema) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SupportedJSONSchema) UnmarshalBinary ¶
func (m *SupportedJSONSchema) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SystemAPIBindings ¶
type SystemAPIBindings struct { // bindings Bindings []*CrossTenantAPIPolicyBinding `json:"bindings" yaml:"bindings"` }
SystemAPIBindings system API bindings
swagger:model SystemAPIBindings
func (*SystemAPIBindings) ContextValidate ¶
ContextValidate validate this system API bindings based on the context it is used
func (*SystemAPIBindings) MarshalBinary ¶
func (m *SystemAPIBindings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SystemAPIBindings) UnmarshalBinary ¶
func (m *SystemAPIBindings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type SystemServicesResponse ¶
type SystemServicesResponse struct { // services Services []*Service `json:"services" yaml:"services"` }
SystemServicesResponse system services response
swagger:model SystemServicesResponse
func (*SystemServicesResponse) ContextValidate ¶
func (m *SystemServicesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this system services response based on the context it is used
func (*SystemServicesResponse) MarshalBinary ¶
func (m *SystemServicesResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*SystemServicesResponse) UnmarshalBinary ¶
func (m *SystemServicesResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TaskAuditPayload ¶
type TaskAuditPayload struct { // attributes Attributes interface{} `json:"attributes,omitempty" yaml:"attributes,omitempty"` // error Error string `json:"error,omitempty" yaml:"error,omitempty"` // name Name string `json:"name,omitempty" yaml:"name,omitempty"` }
TaskAuditPayload task audit payload
swagger:model TaskAuditPayload
func (*TaskAuditPayload) ContextValidate ¶
ContextValidate validates this task audit payload based on context it is used
func (*TaskAuditPayload) MarshalBinary ¶
func (m *TaskAuditPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TaskAuditPayload) UnmarshalBinary ¶
func (m *TaskAuditPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Template ¶
type Template struct { // content of the template Content string `json:"content,omitempty" yaml:"content,omitempty"` // timestamp when the template was created // Format: date-time CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"` // path to the template in a filesystem zip archive // Required: true FsPath string `json:"fs_path" yaml:"fs_path"` // ID of the tenant // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // theme unique identifier // Required: true ThemeID string `json:"theme_id" yaml:"theme_id"` // timestamp when the template was last updated // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"` }
Template Custom Branding template
swagger:model Template
func (*Template) ContextValidate ¶
ContextValidate validates this template based on context it is used
func (*Template) MarshalBinary ¶
MarshalBinary interface implementation
func (*Template) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type TemplatePaths ¶
type TemplatePaths struct { // list of template paths FsPaths []string `json:"fs_paths" yaml:"fs_paths"` }
TemplatePaths template paths
swagger:model TemplatePaths
func (*TemplatePaths) ContextValidate ¶
ContextValidate validates this template paths based on context it is used
func (*TemplatePaths) MarshalBinary ¶
func (m *TemplatePaths) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TemplatePaths) UnmarshalBinary ¶
func (m *TemplatePaths) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Tenant ¶
type Tenant struct { // tenant unique identifier // exampe: default ID string `json:"id,omitempty" yaml:"id,omitempty"` // jwks Jwks *ServerJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"` // metadata Metadata TenantMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // tenant name // Example: Default Name string `json:"name,omitempty" yaml:"name,omitempty"` // settings Settings *TenantSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // styling Styling *Styling `json:"styling,omitempty" yaml:"styling,omitempty"` // optional custom tenant url. If not provided the server url is used instead // Example: https://example.com/default URL string `json:"url,omitempty" yaml:"url,omitempty"` }
Tenant tenant
swagger:model Tenant
func (*Tenant) ContextValidate ¶
ContextValidate validate this tenant based on the context it is used
func (*Tenant) MarshalBinary ¶
MarshalBinary interface implementation
func (*Tenant) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type TenantMetadata ¶
type TenantMetadata map[string]interface{}
TenantMetadata tenant metadata
swagger:model TenantMetadata
func (TenantMetadata) ContextValidate ¶
ContextValidate validates this tenant metadata based on context it is used
type TenantPayload ¶
type TenantPayload struct { // tenant unique identifier // exampe: default ID string `json:"id,omitempty" yaml:"id,omitempty"` // jwks Jwks *ServerJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"` // metadata Metadata TenantMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // tenant name // Example: Default Name string `json:"name,omitempty" yaml:"name,omitempty"` // settings Settings *TenantSettings `json:"settings,omitempty" yaml:"settings,omitempty"` // styling Styling *Styling `json:"styling,omitempty" yaml:"styling,omitempty"` // optional custom tenant url. If not provided the server url is used instead // Example: https://example.com/default URL string `json:"url,omitempty" yaml:"url,omitempty"` }
TenantPayload tenant payload
swagger:model TenantPayload
func (*TenantPayload) ContextValidate ¶
ContextValidate validate this tenant payload based on the context it is used
func (*TenantPayload) MarshalBinary ¶
func (m *TenantPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TenantPayload) UnmarshalBinary ¶
func (m *TenantPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TenantPermissionsResponse ¶
type TenantPermissionsResponse struct { // create identity pool CreateIdentityPool bool `json:"create_identity_pool,omitempty" yaml:"create_identity_pool,omitempty"` // create organization CreateOrganization bool `json:"create_organization,omitempty" yaml:"create_organization,omitempty"` // create workspace CreateWorkspace bool `json:"create_workspace,omitempty" yaml:"create_workspace,omitempty"` // get tenant GetTenant bool `json:"get_tenant,omitempty" yaml:"get_tenant,omitempty"` // list identity pools ListIdentityPools bool `json:"list_identity_pools,omitempty" yaml:"list_identity_pools,omitempty"` // list organizations ListOrganizations bool `json:"list_organizations,omitempty" yaml:"list_organizations,omitempty"` // list workspaces ListWorkspaces bool `json:"list_workspaces,omitempty" yaml:"list_workspaces,omitempty"` // manage admin role ManageAdminRole bool `json:"manage_admin_role,omitempty" yaml:"manage_admin_role,omitempty"` // manage auditor role ManageAuditorRole bool `json:"manage_auditor_role,omitempty" yaml:"manage_auditor_role,omitempty"` // manage brute force protection ManageBruteForceProtection bool `json:"manage_brute_force_protection,omitempty" yaml:"manage_brute_force_protection,omitempty"` // manage business admin role ManageBusinessAdminRole bool `json:"manage_business_admin_role,omitempty" yaml:"manage_business_admin_role,omitempty"` // manage member role ManageMemberRole bool `json:"manage_member_role,omitempty" yaml:"manage_member_role,omitempty"` // manage mfa methods ManageMfaMethods bool `json:"manage_mfa_methods,omitempty" yaml:"manage_mfa_methods,omitempty"` // manage permission systems ManagePermissionSystems bool `json:"manage_permission_systems,omitempty" yaml:"manage_permission_systems,omitempty"` // manage privacy ManagePrivacy bool `json:"manage_privacy,omitempty" yaml:"manage_privacy,omitempty"` // manage server bindings ManageServerBindings bool `json:"manage_server_bindings,omitempty" yaml:"manage_server_bindings,omitempty"` // manage themes ManageThemes bool `json:"manage_themes,omitempty" yaml:"manage_themes,omitempty"` // manage vanity domains ManageVanityDomains bool `json:"manage_vanity_domains,omitempty" yaml:"manage_vanity_domains,omitempty"` // read brute force protection ReadBruteForceProtection bool `json:"read_brute_force_protection,omitempty" yaml:"read_brute_force_protection,omitempty"` // read mfa methods ReadMfaMethods bool `json:"read_mfa_methods,omitempty" yaml:"read_mfa_methods,omitempty"` // read permission systems ReadPermissionSystems bool `json:"read_permission_systems,omitempty" yaml:"read_permission_systems,omitempty"` // read privacy ReadPrivacy bool `json:"read_privacy,omitempty" yaml:"read_privacy,omitempty"` // read roles ReadRoles bool `json:"read_roles,omitempty" yaml:"read_roles,omitempty"` // read server bindings ReadServerBindings bool `json:"read_server_bindings,omitempty" yaml:"read_server_bindings,omitempty"` // read system apis ReadSystemApis bool `json:"read_system_apis,omitempty" yaml:"read_system_apis,omitempty"` // read system environment ReadSystemEnvironment bool `json:"read_system_environment,omitempty" yaml:"read_system_environment,omitempty"` // read system notifications ReadSystemNotifications bool `json:"read_system_notifications,omitempty" yaml:"read_system_notifications,omitempty"` // read system services ReadSystemServices bool `json:"read_system_services,omitempty" yaml:"read_system_services,omitempty"` // read system templates ReadSystemTemplates bool `json:"read_system_templates,omitempty" yaml:"read_system_templates,omitempty"` // read themes ReadThemes bool `json:"read_themes,omitempty" yaml:"read_themes,omitempty"` // read vanity domains ReadVanityDomains bool `json:"read_vanity_domains,omitempty" yaml:"read_vanity_domains,omitempty"` // tenant read analytics TenantReadAnalytics bool `json:"tenant_read_analytics,omitempty" yaml:"tenant_read_analytics,omitempty"` // update tenant UpdateTenant bool `json:"update_tenant,omitempty" yaml:"update_tenant,omitempty"` }
TenantPermissionsResponse tenant permissions response
swagger:model TenantPermissionsResponse
func (*TenantPermissionsResponse) ContextValidate ¶
func (m *TenantPermissionsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this tenant permissions response based on context it is used
func (*TenantPermissionsResponse) MarshalBinary ¶
func (m *TenantPermissionsResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TenantPermissionsResponse) UnmarshalBinary ¶
func (m *TenantPermissionsResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TenantRoleSubject ¶
type TenantRoleSubject struct { // identity pool user pool id IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // identity pool user id IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"` // idp user idp id IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"` // roles Roles *TenantRoles `json:"roles,omitempty" yaml:"roles,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type // Enum: ["identity_pool_user","idp"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // idp user workspace id WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
TenantRoleSubject tenant role subject
swagger:model TenantRoleSubject
func (*TenantRoleSubject) ContextValidate ¶
ContextValidate validate this tenant role subject based on the context it is used
func (*TenantRoleSubject) MarshalBinary ¶
func (m *TenantRoleSubject) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TenantRoleSubject) UnmarshalBinary ¶
func (m *TenantRoleSubject) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TenantRoles ¶
type TenantRoles struct { // admin Admin bool `json:"admin,omitempty" yaml:"admin,omitempty"` // auditor Auditor bool `json:"auditor,omitempty" yaml:"auditor,omitempty"` // business admin BusinessAdmin bool `json:"business_admin,omitempty" yaml:"business_admin,omitempty"` // member Member bool `json:"member,omitempty" yaml:"member,omitempty"` }
TenantRoles tenant roles
swagger:model TenantRoles
func (*TenantRoles) ContextValidate ¶
ContextValidate validates this tenant roles based on context it is used
func (*TenantRoles) MarshalBinary ¶
func (m *TenantRoles) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TenantRoles) UnmarshalBinary ¶
func (m *TenantRoles) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TenantRolesResponse ¶
type TenantRolesResponse struct { // subjects Subjects []*TenantRoleSubject `json:"subjects" yaml:"subjects"` }
TenantRolesResponse tenant roles response
swagger:model TenantRolesResponse
func (*TenantRolesResponse) ContextValidate ¶
ContextValidate validate this tenant roles response based on the context it is used
func (*TenantRolesResponse) MarshalBinary ¶
func (m *TenantRolesResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TenantRolesResponse) UnmarshalBinary ¶
func (m *TenantRolesResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TenantSettings ¶
type TenantSettings struct { // default template id DefaultTemplateID string `json:"default_template_id,omitempty" yaml:"default_template_id,omitempty"` // default workspace id DefaultWorkspaceID string `json:"default_workspace_id,omitempty" yaml:"default_workspace_id,omitempty"` // security Security *SecureOptions `json:"security,omitempty" yaml:"security,omitempty"` // well known WellKnown map[string]interface{} `json:"well_known,omitempty" yaml:"well_known,omitempty"` }
TenantSettings tenant settings
swagger:model TenantSettings
func (*TenantSettings) ContextValidate ¶
ContextValidate validate this tenant settings based on the context it is used
func (*TenantSettings) MarshalBinary ¶
func (m *TenantSettings) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TenantSettings) UnmarshalBinary ¶
func (m *TenantSettings) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TestAPIResult ¶
type TestAPIResult struct { // graphql types GraphqlTypes GraphQLTypes `json:"graphql_types,omitempty" yaml:"graphql_types,omitempty"` // match Match bool `json:"match,omitempty" yaml:"match,omitempty"` // policy id PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"` }
TestAPIResult test API result
swagger:model TestAPIResult
func (*TestAPIResult) ContextValidate ¶
ContextValidate validate this test API result based on the context it is used
func (*TestAPIResult) MarshalBinary ¶
func (m *TestAPIResult) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TestAPIResult) UnmarshalBinary ¶
func (m *TestAPIResult) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TestMFAMethodRequest ¶
type TestMFAMethodRequest struct { // address // Required: true Address string `json:"address" yaml:"address"` }
TestMFAMethodRequest test m f a method request
swagger:model TestMFAMethodRequest
func (*TestMFAMethodRequest) ContextValidate ¶
ContextValidate validates this test m f a method request based on context it is used
func (*TestMFAMethodRequest) MarshalBinary ¶
func (m *TestMFAMethodRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TestMFAMethodRequest) UnmarshalBinary ¶
func (m *TestMFAMethodRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TestPolicyDefinition ¶
type TestPolicyDefinition struct { // The definition of an Open Policy Agent (OPA) policy provided using the REGO language. Definition string `json:"definition,omitempty" yaml:"definition,omitempty"` // Language of a policy // // ACP supports creating Cloudentity policies (using a visual editor or defined using JSON or // YAML) and Open Policy Agent (OPA) policies (defined using REGO). // // OPA is a policy engine that unifies policy enforcement and provides a high-level declarative // language (REGO) that lets you specify policies as code. REGO supports referencing nested // documents and ensures that your queries are correct and unambiguous. // Example: cloudentity Language string `json:"language,omitempty" yaml:"language,omitempty"` // An array of validators for a Cloudentity policy Validators []*ValidatorConfig `json:"validators" yaml:"validators"` }
TestPolicyDefinition Definition of a policy that you wish to test
swagger:model TestPolicyDefinition
func (*TestPolicyDefinition) ContextValidate ¶
ContextValidate validate this test policy definition based on the context it is used
func (*TestPolicyDefinition) MarshalBinary ¶
func (m *TestPolicyDefinition) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TestPolicyDefinition) UnmarshalBinary ¶
func (m *TestPolicyDefinition) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TestPolicyInput ¶
type TestPolicyInput struct { // authn ctx AuthnCtx AuthenticationContext `json:"authn_ctx,omitempty" yaml:"authn_ctx,omitempty"` // Contexts for your policy validation Contexts map[string]interface{} `json:"contexts,omitempty" yaml:"contexts,omitempty"` // request Request *TestPolicyInputRequest `json:"request,omitempty" yaml:"request,omitempty"` }
TestPolicyInput Contains the input for the request that is used to test the policy.
swagger:model TestPolicyInput
func (*TestPolicyInput) ContextValidate ¶
ContextValidate validate this test policy input based on the context it is used
func (*TestPolicyInput) MarshalBinary ¶
func (m *TestPolicyInput) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TestPolicyInput) UnmarshalBinary ¶
func (m *TestPolicyInput) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TestPolicyInputRequest ¶
type TestPolicyInputRequest struct { // Body that is used in your request that you use to test your policy Body string `json:"body,omitempty" yaml:"body,omitempty"` // Headers that are used in your request that you use to test your policy Headers map[string][]string `json:"headers,omitempty" yaml:"headers,omitempty"` // Method that is used in your request that you use to test your policy Method string `json:"method,omitempty" yaml:"method,omitempty"` // Path that is used in your request that you use to test your policy Path string `json:"path,omitempty" yaml:"path,omitempty"` // Path parameters that are used in your request that you use to test your policy PathParams map[string]string `json:"path_params,omitempty" yaml:"path_params,omitempty"` // Query parameters that are used in your request that you use to test your policy QueryParams map[string][]string `json:"query_params,omitempty" yaml:"query_params,omitempty"` }
TestPolicyInputRequest test policy input request
swagger:model TestPolicyInputRequest
func (*TestPolicyInputRequest) ContextValidate ¶
func (m *TestPolicyInputRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this test policy input request based on context it is used
func (*TestPolicyInputRequest) MarshalBinary ¶
func (m *TestPolicyInputRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TestPolicyInputRequest) UnmarshalBinary ¶
func (m *TestPolicyInputRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TestPolicyRequest ¶
type TestPolicyRequest struct { // input Input *TestPolicyInput `json:"input,omitempty" yaml:"input,omitempty"` // policy Policy *TestPolicyDefinition `json:"policy,omitempty" yaml:"policy,omitempty"` // Authorization server (workspace) ID ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` }
TestPolicyRequest test policy request
swagger:model TestPolicyRequest
func (*TestPolicyRequest) ContextValidate ¶
ContextValidate validate this test policy request based on the context it is used
func (*TestPolicyRequest) MarshalBinary ¶
func (m *TestPolicyRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TestPolicyRequest) UnmarshalBinary ¶
func (m *TestPolicyRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TestPolicyResponse ¶
type TestPolicyResponse struct { // failures Failures []*ValidateResponseValidatorFailure `json:"failures" yaml:"failures"` // output Output map[string]interface{} `json:"output,omitempty" yaml:"output,omitempty"` // recovery Recovery []interface{} `json:"recovery" yaml:"recovery"` // result Result string `json:"result,omitempty" yaml:"result,omitempty"` // status Status bool `json:"status,omitempty" yaml:"status,omitempty"` }
TestPolicyResponse test policy response
swagger:model TestPolicyResponse
func (*TestPolicyResponse) ContextValidate ¶
ContextValidate validate this test policy response based on the context it is used
func (*TestPolicyResponse) MarshalBinary ¶
func (m *TestPolicyResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TestPolicyResponse) UnmarshalBinary ¶
func (m *TestPolicyResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TestRequest ¶
type TestRequest struct { // api // Required: true API *API `json:"api" yaml:"api"` // test request // Required: true TestRequest *HTTPRequest `json:"test_request" yaml:"test_request"` }
TestRequest test request
swagger:model TestRequest
func (*TestRequest) ContextValidate ¶
ContextValidate validate this test request based on the context it is used
func (*TestRequest) MarshalBinary ¶
func (m *TestRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TestRequest) UnmarshalBinary ¶
func (m *TestRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TestScriptRequest ¶
type TestScriptRequest struct { // Contains the script source for testing Body string `json:"body,omitempty" yaml:"body,omitempty"` // env version EnvVersion FnEnvVersion `json:"env_version,omitempty" yaml:"env_version,omitempty"` // Contains the input for the script Input map[string]interface{} `json:"input,omitempty" yaml:"input,omitempty"` }
TestScriptRequest test script request
swagger:model TestScriptRequest
func (*TestScriptRequest) ContextValidate ¶
ContextValidate validate this test script request based on the context it is used
func (*TestScriptRequest) MarshalBinary ¶
func (m *TestScriptRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TestScriptRequest) UnmarshalBinary ¶
func (m *TestScriptRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type Theme ¶
type Theme struct { // theme unique identifier ID string `json:"id,omitempty" yaml:"id,omitempty"` // theme logo url LogoURL string `json:"logo_url,omitempty" yaml:"logo_url,omitempty"` // Display name of the theme // Example: acme Name string `json:"name,omitempty" yaml:"name,omitempty"` // ID of the tenant // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` }
Theme Custom Branding theme
swagger:model Theme
func (*Theme) ContextValidate ¶
ContextValidate validates this theme based on context it is used
func (*Theme) MarshalBinary ¶
MarshalBinary interface implementation
func (*Theme) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type Themes ¶
type Themes struct { // list of themes Themes []*Theme `json:"themes" yaml:"themes"` }
Themes themes
swagger:model Themes
func (*Themes) ContextValidate ¶
ContextValidate validate this themes based on the context it is used
func (*Themes) MarshalBinary ¶
MarshalBinary interface implementation
func (*Themes) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type Token ¶
type Token struct { // index Index int64 `json:"Index,omitempty" yaml:"Index,omitempty"` // parent Parent *Element `json:"Parent,omitempty" yaml:"Parent,omitempty"` }
Token A Token is an interface type used to represent XML elements, character data, CDATA sections, XML comments, XML directives, and XML processing instructions.
swagger:model Token
func (*Token) ContextValidate ¶
ContextValidate validate this token based on the context it is used
func (*Token) MarshalBinary ¶
MarshalBinary interface implementation
func (*Token) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type TokenTTLs ¶
type TokenTTLs struct { // Access token time to live // // After an access token reaches its time to live, it expires and it cannot be used to // authenticate the client application. // Example: 1h10m30s // Format: duration AccessTokenTTL strfmt.Duration `json:"access_token_ttl,omitempty" yaml:"access_token_ttl,omitempty"` // Authorization code time to live // // After an authorization code reaches its time to live, it expires and it cannot be used to // authorize the request to the `/token` endpoint. // Example: 10m0s // Format: duration AuthorizationCodeTTL strfmt.Duration `json:"authorization_code_ttl,omitempty" yaml:"authorization_code_ttl,omitempty"` // ID token time to live // // After an ID token reaches its time to live, it expires and it cannot be used to provide // user profile information to a client application. // Example: 1h10m30s // Format: duration IDTokenTTL strfmt.Duration `json:"id_token_ttl,omitempty" yaml:"id_token_ttl,omitempty"` // Refresh token time to live // // After a refresh token reaches its time to live, it expires and it cannot be used to obtain // new access tokens for a client application. // Example: 720h0m0s // Format: duration RefreshTokenTTL strfmt.Duration `json:"refresh_token_ttl,omitempty" yaml:"refresh_token_ttl,omitempty"` }
TokenTTLs token t t ls
swagger:model TokenTTLs
func (*TokenTTLs) ContextValidate ¶
ContextValidate validates this token t t ls based on context it is used
func (*TokenTTLs) MarshalBinary ¶
MarshalBinary interface implementation
func (*TokenTTLs) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type TokensRevokedPayload ¶
type TokensRevokedPayload struct { // consent ID for which the token has been revoked (populated only if type equals consent) ConsentID string `json:"consent_id,omitempty" yaml:"consent_id,omitempty"` // entity type for which token has been revoked // Example: consent Type string `json:"type,omitempty" yaml:"type,omitempty"` }
TokensRevokedPayload tokens revoked payload
swagger:model TokensRevokedPayload
func (*TokensRevokedPayload) ContextValidate ¶
ContextValidate validates this tokens revoked payload based on context it is used
func (*TokensRevokedPayload) MarshalBinary ¶
func (m *TokensRevokedPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TokensRevokedPayload) UnmarshalBinary ¶
func (m *TokensRevokedPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type TrustAnchorConfiguration ¶
type TrustAnchorConfiguration struct { // jwks Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"` // URI of the JWKs of the trusted party responsible for signing the Software Statement JwksURI string `json:"jwks_uri,omitempty" yaml:"jwks_uri,omitempty"` }
TrustAnchorConfiguration trust anchor configuration
swagger:model TrustAnchorConfiguration
func (*TrustAnchorConfiguration) ContextValidate ¶
func (m *TrustAnchorConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this trust anchor configuration based on the context it is used
func (*TrustAnchorConfiguration) MarshalBinary ¶
func (m *TrustAnchorConfiguration) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*TrustAnchorConfiguration) UnmarshalBinary ¶
func (m *TrustAnchorConfiguration) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type UKConsentPayload ¶
type UKConsentPayload struct { // account ids AccountIds []string `json:"account_ids" yaml:"account_ids"` // Client application identifier. // Example: \"cauqo9c9vpbs0aj2b2v0\ ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // consent id ConsentID string `json:"consent_id,omitempty" yaml:"consent_id,omitempty"` // created at // Format: date-time CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"` // idempotency key IdempotencyKey string `json:"idempotency_key,omitempty" yaml:"idempotency_key,omitempty"` // request hash RequestHash string `json:"request_hash,omitempty" yaml:"request_hash,omitempty"` // Server / Workspace identifier. // Example: \"server\ ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // spec Spec string `json:"spec,omitempty" yaml:"spec,omitempty"` // spec version SpecVersion SpecVersion `json:"spec_version,omitempty" yaml:"spec_version,omitempty"` // status Status string `json:"status,omitempty" yaml:"status,omitempty"` // Tenant identifier. // Example: \"tenant\ TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type Type ConsentType `json:"type,omitempty" yaml:"type,omitempty"` }
UKConsentPayload u k consent payload
swagger:model UKConsentPayload
func (*UKConsentPayload) ContextValidate ¶
ContextValidate validate this u k consent payload based on the context it is used
func (*UKConsentPayload) MarshalBinary ¶
func (m *UKConsentPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*UKConsentPayload) UnmarshalBinary ¶
func (m *UKConsentPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type UnbindSystemAPIRequest ¶
type UnbindSystemAPIRequest struct { // api id APIID string `json:"api_id,omitempty" yaml:"api_id,omitempty"` // policy id PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"` // policy server id PolicyServerID string `json:"policy_server_id,omitempty" yaml:"policy_server_id,omitempty"` }
UnbindSystemAPIRequest unbind system API request
swagger:model UnbindSystemAPIRequest
func (*UnbindSystemAPIRequest) ContextValidate ¶
func (m *UnbindSystemAPIRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this unbind system API request based on context it is used
func (*UnbindSystemAPIRequest) MarshalBinary ¶
func (m *UnbindSystemAPIRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*UnbindSystemAPIRequest) UnmarshalBinary ¶
func (m *UnbindSystemAPIRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type UpdateAPIRequest ¶
type UpdateAPIRequest struct { // Data classifications DataClassifications []string `json:"data_classifications" yaml:"data_classifications"` // optional graphql schema GraphqlSchema string `json:"graphql_schema,omitempty" yaml:"graphql_schema,omitempty"` // graphql types GraphqlTypes GraphQLTypes `json:"graphql_types,omitempty" yaml:"graphql_types,omitempty"` // optional id of a policy // Example: block PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"` }
UpdateAPIRequest update API request
swagger:model UpdateAPIRequest
func (*UpdateAPIRequest) ContextValidate ¶
ContextValidate validate this update API request based on the context it is used
func (*UpdateAPIRequest) MarshalBinary ¶
func (m *UpdateAPIRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*UpdateAPIRequest) UnmarshalBinary ¶
func (m *UpdateAPIRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type UpdateClientAdminRequest ¶
type UpdateClientAdminRequest struct { // Application URL AppURL string `json:"app_url,omitempty" yaml:"app_url,omitempty"` // The client application type. // // Client applications can be either of a `web` or `native` types. // // Web applications include clients like server web applications or service apps. // // Native applications include single-page applications (SPAs) and mobile or desktop // applications. // // Apply security measures according to the type of your application. // Example: web ApplicationType string `json:"application_type,omitempty" yaml:"application_type,omitempty"` // An array of dynamically calculated application types that can be used for filtering // Example: ["single_page","server_web","mobile_desktop","service","legacy","dcr"] // Read Only: true ApplicationTypes []string `json:"application_types" yaml:"application_types"` // Identity of the intended recipients (the audience). // // Typically, the audience is a single resource server or a list of resource servers. // // It is considered a good practice to limit the audience of the token for security purposes. Audience []string `json:"audience" yaml:"audience"` // Authorization details types // // Indicates what authorization details types the client can use. AuthorizationDetailsTypes []AuthorizationDetailType `json:"authorization_details_types" yaml:"authorization_details_types"` // Algorithm used for encrypting authorization responses. // // If both signing and encryption are requested, the response is first signed, and then encrypted. // As a result, a Nested JWT is obtained, as defined in JWT [RFC7519]. // // If omitted, no encryption is applied by default. // Example: RSA-OAEP-256 // Enum: ["RSA-OAEP","RSA-OAEP-256"] AuthorizationEncryptedResponseAlg string `json:"authorization_encrypted_response_alg,omitempty" yaml:"authorization_encrypted_response_alg,omitempty"` // Algorithm used for encrypting authorization responses. // // With `authorization_encrypted_response_alg` specified, the default value is `A128CBC-HS256`. // When `authorization_encrypted_response_enc` is included, `authorization_encrypted_response_alg` // MUST also be provided in a request. // Example: A128CBC-HS256 // Enum: ["A256GCM","A128CBC-HS256"] AuthorizationEncryptedResponseEnc string `json:"authorization_encrypted_response_enc,omitempty" yaml:"authorization_encrypted_response_enc,omitempty"` // An authorization server (workspace) identifier holding the client application. // Example: default // Required: true AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"` // Algorithm used for signing authorization responses. // // With this parameter specified, the response is signed using JWS and according to the configured algorithm. // // `none` isn't allowed. // Example: RS256 AuthorizationSignedResponseAlg string `json:"authorization_signed_response_alg,omitempty" yaml:"authorization_signed_response_alg,omitempty"` // OPTIONAL. The JWS alg algorithm value used by the client application to sign authentication requests. // // When omitted, the client application doesn't send signed authentication requests. BackchannelAuthenticationRequestSigningAlg string `` /* 127-byte string literal not displayed */ // REQUIRED for requests when the client application uses CIBA as an authorization grant type, and the token // delivery mode is set to `ping` or `push`. // // This parameter is the endpoint where an OP (OpenID Provider) posts a notification after end-user authentication. // // Input: an HTTPS URL. BackchannelClientNotificationEndpoint string `json:"backchannel_client_notification_endpoint,omitempty" yaml:"backchannel_client_notification_endpoint,omitempty"` // Boolean value specifying whether the RP requires that a sid (session ID) claim be included in the Logout Token to identify the RP session with the OP when the backchannel_logout_uri is used. BackchannelLogoutSessionRequired bool `json:"backchannel_logout_session_required,omitempty" yaml:"backchannel_logout_session_required,omitempty"` // RP URL that will cause the RP to log itself out when sent a Logout Token by the OP. BackchannelLogoutURI string `json:"backchannel_logout_uri,omitempty" yaml:"backchannel_logout_uri,omitempty"` // REQUIRED for requests when the client application uses CIBA as an authorization grant type. // // Input: `poll`, `ping`, or `push`. BackchannelTokenDeliveryMode string `json:"backchannel_token_delivery_mode,omitempty" yaml:"backchannel_token_delivery_mode,omitempty"` // OPTIONAL. A boolean value indicating the `user_code` parameter support by the client application. // // If omitted, the default value is `false`. // // This applies only when the `backchannel_user_code_parameter_supported` OP parameter is `true`. BackchannelUserCodeParameter bool `json:"backchannel_user_code_parameter,omitempty" yaml:"backchannel_user_code_parameter,omitempty"` // OAuth client application identifier // // If not provided, a random client ID is generated. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // The client identifier time of issue. // // The value is the number of seconds between 1970-01-01T00:00:00Z (UTC) and the date/time of issue. ClientIDIssuedAt int64 `json:"client_id_issued_at,omitempty" yaml:"client_id_issued_at,omitempty"` // Human-readable name of a client application. // Example: My app ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"` // OAuth client secret // // If not provided, a random client secret is generated. // Min Length: 32 ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"` // The client secret expiration time. // // If the client secret does not expire, `client_secret_expires_at` = `0`. ClientSecretExpiresAt int64 `json:"client_secret_expires_at,omitempty" yaml:"client_secret_expires_at,omitempty"` // Defines whether the client application is active or not. // // Only clients with the `Active` status can preform authorization, authentication, and PAR requests. // Enum: ["active","inactive"] ClientStatus string `json:"client_status,omitempty" yaml:"client_status,omitempty"` // client type // Enum: ["oauth2","saml"] ClientType string `json:"client_type,omitempty" yaml:"client_type,omitempty"` // URI of a client application. ClientURI string `json:"client_uri,omitempty" yaml:"client_uri,omitempty"` // Date when the client application was created. // Example: 2022-04-07T19:17:31.323187Z // Format: date-time CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"` // default ACR values // list of ACR values that will be implicitly requested for the client if not explicitly specified DefaultAcrValues []string `json:"default_acr_values" yaml:"default_acr_values"` // Description of the client application. Description string `json:"description,omitempty" yaml:"description,omitempty"` // Optional developer owner of the client application. DeveloperID string `json:"developer_id,omitempty" yaml:"developer_id,omitempty"` // developer metadata DeveloperMetadata Metadata `json:"developer_metadata,omitempty" yaml:"developer_metadata,omitempty"` // Boolean value specifying whether the client always uses DPoP for token requests // If true, the authorization server will reject token requests from this client that do not contain the DPoP header. DpopBoundAccessTokens bool `json:"dpop_bound_access_tokens,omitempty" yaml:"dpop_bound_access_tokens,omitempty"` // fdx Fdx *FDXMetadata `json:"fdx,omitempty" yaml:"fdx,omitempty"` // An array of allowed OAuth client grant types. // // The `grantTypes` array stores OAuth flows that are allowed for a given client application. // // [Read more](https://cloudentity.com/developers/basics/oauth-grant-types/grant-types-overview/) about grant types. // Example: ["password","refresh_token","client_credentials","implicit","authorization_code"] GrantTypes []string `json:"grant_types" yaml:"grant_types"` // An array of hashed rotated client secrets HashedRotatedSecrets []string `json:"hashed_rotated_secrets" yaml:"hashed_rotated_secrets"` // Hashed client secret // // Hashing client secrets provides additional security for your secrets storage as it hides // plaintext secrets from being viewed both in the UI and the database. HashedSecret string `json:"hashed_secret,omitempty" yaml:"hashed_secret,omitempty"` // JWE alg algorithm for encrypting the ID token issued to this client application. // Enum: ["RSA-OAEP","RSA-OAEP-256"] IDTokenEncryptedResponseAlg string `json:"id_token_encrypted_response_alg,omitempty" yaml:"id_token_encrypted_response_alg,omitempty"` // JWE enc algorithm for encrypting the ID token issued to this client application. // Enum: ["A256GCM","A128CBC-HS256"] IDTokenEncryptedResponseEnc string `json:"id_token_encrypted_response_enc,omitempty" yaml:"id_token_encrypted_response_enc,omitempty"` // Algorithm for signing ID tokens issued for a client application. // // The default value depends on authorization server configuration. // Example: ES256 // Enum: ["RS256","ES256","PS256"] IDTokenSignedResponseAlg string `json:"id_token_signed_response_alg,omitempty" yaml:"id_token_signed_response_alg,omitempty"` // An introspection endpoint authentication method configured for the client application (read-only). // // If empty, the `token_endpoint_auth_method` is used. // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none"] IntrospectionEndpointAuthMethod string `json:"introspection_endpoint_auth_method,omitempty" yaml:"introspection_endpoint_auth_method,omitempty"` // jwks Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"` // A URL of JSON Web Key Set with the public keys used by a client application to authenticate to Cloudentity. JwksURI string `json:"jwks_uri,omitempty" yaml:"jwks_uri,omitempty"` // Logo URI. LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // metadata Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // External organization identifier. It is a unique string assigned by the CDR Register to identify an Accredited // Data Recipient Brand. // // The value obtained is used as the `aud` claim for message signing, for example, when a JSON Web Token (JWT) is // required for authorization, and represents the audience(s) the JWT is intended for. // Example: 5647fe90-f6bc-11eb-9a03-0242ac130003 OrganisationID string `json:"organisation_id,omitempty" yaml:"organisation_id,omitempty"` // Policy URL to read about how the profile data is used. PolicyURI string `json:"policy_uri,omitempty" yaml:"policy_uri,omitempty"` // Array of URLs to which a relying party may request that the user be redirected after a logout has been performed. PostLogoutRedirectUris []string `json:"post_logout_redirect_uris" yaml:"post_logout_redirect_uris"` // privacy Privacy *ClientPrivacy `json:"privacy,omitempty" yaml:"privacy,omitempty"` // redirect uris RedirectUris RedirectURIs `json:"redirect_uris,omitempty" yaml:"redirect_uris,omitempty"` // Optional JWE alg algorithm the client is declaring that it may use for encrypting Request Objects // Example: RSA-OAEP // Enum: ["RSA-OAEP","RSA-OAEP-256"] RequestObjectEncryptionAlg string `json:"request_object_encryption_alg,omitempty" yaml:"request_object_encryption_alg,omitempty"` // Optional JWE enc algorithm the client is declaring that it may use for encrypting Request Objects // When `request_object_encryption_enc` is included, `request_object_encryption_alg` MUST also be provided. // Example: A256GCM // Enum: ["A256GCM","A128CBC-HS256"] RequestObjectEncryptionEnc string `json:"request_object_encryption_enc,omitempty" yaml:"request_object_encryption_enc,omitempty"` // Request object signing algorithm for the token endpoint // // Cloudentity supports signing tokens with the RS256, ES256, and PS256 algorithms. If you do not want // to use a signing algorithm, set the value of this parameter to `none`. // Example: none // Enum: ["any","none","RS256","ES256","PS256"] RequestObjectSigningAlg string `json:"request_object_signing_alg,omitempty" yaml:"request_object_signing_alg,omitempty"` // Array of absolute URIs that points to the Request Object that holds authorization request parameters. RequestUris []string `json:"request_uris" yaml:"request_uris"` // Boolean parameter indicating whether the only means of initiating an authorization request the client is allowed to use is PAR. RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"` // response types ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"` // A revocation endpoint authentication method configured for the client application (read-only). // If empty, the `token_endpoint_auth_method` is used. // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none"] RevocationEndpointAuthMethod string `json:"revocation_endpoint_auth_method,omitempty" yaml:"revocation_endpoint_auth_method,omitempty"` // An array of rotated OAuth client secrets RotatedSecrets []string `json:"rotated_secrets" yaml:"rotated_secrets"` // saml metadata SamlMetadata *EntityDescriptor `json:"saml_metadata,omitempty" yaml:"saml_metadata,omitempty"` // saml service provider id SamlServiceProviderID string `json:"saml_service_provider_id,omitempty" yaml:"saml_service_provider_id,omitempty"` // Space-separated list of scopes for compatibility with the OAuth specification. // Example: email offline_access openid Scope string `json:"scope,omitempty" yaml:"scope,omitempty"` // An array of string represented scopes assigned to a client application // Example: ["email","offline_access","openid"] Scopes []string `json:"scopes" yaml:"scopes"` // OPTIONAL. [A URL using the HTTPS scheme](https://openid.net/specs/openid-connect-registration-1_0.html#SectorIdentifierValidation). // It must reference a JSON file with the array of `redirect_uri` values. // // Pass this parameter when you use multiple domains in your `redirect_uris` or need a mechanism to allow changes in // domain without affecting consumer consent. // // [Read more](https://openid.net/specs/openid-connect-core-1_0.html) SectorIdentifierURI string `json:"sector_identifier_uri,omitempty" yaml:"sector_identifier_uri,omitempty"` // A digitally signed or MACed JSON Web Token (JWT) [RFC7519] that // asserts metadata values about the client software. In some cases, // a software statement is issued directly by the client // developer. In other cases, a software statement is issued by // a third-party organization for use by the client developer. // // In both cases, the trust relationship the authorization server has // with the issuer of the software statement is intended to be used // as an input to the evaluation of whether the registration request // is accepted. // // A software statement can be presented to an // authorization server as part of the client registration request. SoftwareStatement string `json:"software_statement,omitempty" yaml:"software_statement,omitempty"` // software statement payload SoftwareStatementPayload Metadata `json:"software_statement_payload,omitempty" yaml:"software_statement_payload,omitempty"` // Subject identifier type // // Stores information if the subject identifier is of the `public` or the `pairwise` type. // // Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer, // and are intended to be consumed by client applications. There are two types // of subject identifiers: `public` and `pairwise`. // // For the `public` type, the value of the `sub` (subject) token claim is the same for all clients. // // For the `pairwise` type, a different `sub` (subject) token claim is provided for each client. // Using the `pairwise` subject identifier makes it impossible for client applications to correlate the end-user's // activity without their permission. // Example: public // Enum: ["public","pairwise"] SubjectType string `json:"subject_type,omitempty" yaml:"subject_type,omitempty"` // Defines whether the client application is a system tenant's application or not. System bool `json:"system,omitempty" yaml:"system,omitempty"` // ID of a tenant where the client application is added // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // A string containing the value of an expected dNSName SAN entry in the certificate. TLSClientAuthSanDNS string `json:"tls_client_auth_san_dns,omitempty" yaml:"tls_client_auth_san_dns,omitempty"` // A string containing the value of an expected rfc822Name SAN entry in the certificate. TLSClientAuthSanEmail string `json:"tls_client_auth_san_email,omitempty" yaml:"tls_client_auth_san_email,omitempty"` // A string representation of an IP address in either dotted decimal notation (for IPv4) or colon-delimited hexadecimal (for IPv6, as defined in [RFC5952]) that is expected to be present as an iPAddress SAN entry in the certificate. TLSClientAuthSanIP string `json:"tls_client_auth_san_ip,omitempty" yaml:"tls_client_auth_san_ip,omitempty"` // A string containing the value of an expected uniformResourceIdentifier SAN entry in the certificate. TLSClientAuthSanURI string `json:"tls_client_auth_san_uri,omitempty" yaml:"tls_client_auth_san_uri,omitempty"` // An [RFC4514] string representation of the expected subject distinguished name of the certificate. TLSClientAuthSubjectDn string `json:"tls_client_auth_subject_dn,omitempty" yaml:"tls_client_auth_subject_dn,omitempty"` // Boolean value indicating server support for mutual TLS client certificate-bound access tokens. If omitted, the default value is "false". TLSClientCertificateBoundAccessTokens bool `json:"tls_client_certificate_bound_access_tokens,omitempty" yaml:"tls_client_certificate_bound_access_tokens,omitempty"` // Token endpoint authentication method configured for a client application // // Cloudentity supports the following client authentication methods: // `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`, // `self_signed_tls_client_auth`, `tls_client_auth`, `none`. // // To learn more, go to the Authorization Basics > Client Authentication section of this guide. // Example: client_secret_basic // Enum: ["client_secret_basic","client_secret_post","client_secret_jwt","private_key_jwt","self_signed_tls_client_auth","tls_client_auth","none","unspecified"] TokenEndpointAuthMethod string `json:"token_endpoint_auth_method,omitempty" yaml:"token_endpoint_auth_method,omitempty"` // Signing algorithm for the token endpoint // // This field is optional. If empty, a client can use any algorithm supported by the server (see `token_endpoint_auth_signing_alg_values_supported` in the well-known endpoing). // // If provided, depending on the server configuration, client can use of one: HS256, RS256, ES256, PS256 algorithms. // // If your token endpoint authentication is set to the `private_key_jwt` method, the // `token_endpoint_auth_signing_alg` parameter must be either RS256, ES256, or PS256. // // If your token endpoint authentication is set to the `client_secret_jwt` method, // the `token_endpoint_auth_signing_alg` parameter must be HS256. // Example: ES256 // Enum: ["RS256","ES256","PS256","HS256",""] TokenEndpointAuthSigningAlg string `json:"token_endpoint_auth_signing_alg,omitempty" yaml:"token_endpoint_auth_signing_alg,omitempty"` // token exchange TokenExchange *ClientTokenExchangeConfiguration `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"` // token ttls TokenTtls *TokenTTLs `json:"token_ttls,omitempty" yaml:"token_ttls,omitempty"` // Terms of Service URL. TosURI string `json:"tos_uri,omitempty" yaml:"tos_uri,omitempty"` // Defines whether the client application is trusted or not. // // For trusted clients, consent pages are skipped during the authorization process. Trusted bool `json:"trusted,omitempty" yaml:"trusted,omitempty"` // Date when the client application was updated. // Example: 2022-05-08T01:11:51.1262916Z // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"` // If enabled the client application will be able to set its own token TTLs. UseCustomTokenTtls bool `json:"use_custom_token_ttls,omitempty" yaml:"use_custom_token_ttls,omitempty"` // JWS alg algorithm REQUIRED for signing UserInfo Responses. // // If specified, the response is a JWT serialized and signed with JWS. // // If omitted, then by default, UserInfo Response returns the Claims // as an UTF-8 encoded JSON object using the application/json content-type. // Example: none // Enum: ["none","RS256","ES256"] UserinfoSignedResponseAlg string `json:"userinfo_signed_response_alg,omitempty" yaml:"userinfo_signed_response_alg,omitempty"` }
UpdateClientAdminRequest update client admin request
swagger:model UpdateClientAdminRequest
func (*UpdateClientAdminRequest) ContextValidate ¶
func (m *UpdateClientAdminRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this update client admin request based on the context it is used
func (*UpdateClientAdminRequest) MarshalBinary ¶
func (m *UpdateClientAdminRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*UpdateClientAdminRequest) UnmarshalBinary ¶
func (m *UpdateClientAdminRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type UpdateGatewayRequest ¶
type UpdateGatewayRequest struct { // default policy id assigned to new APIs DefaultPolicyID string `json:"default_policy_id,omitempty" yaml:"default_policy_id,omitempty"` // description Description string `json:"description,omitempty" yaml:"description,omitempty"` // gateway name // Example: Cloudentity Pyron Name string `json:"name,omitempty" yaml:"name,omitempty"` // token exchange TokenExchange *GatewayTokenExchangeSettings `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"` }
UpdateGatewayRequest update gateway request
swagger:model UpdateGatewayRequest
func (*UpdateGatewayRequest) ContextValidate ¶
ContextValidate validate this update gateway request based on the context it is used
func (*UpdateGatewayRequest) MarshalBinary ¶
func (m *UpdateGatewayRequest) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*UpdateGatewayRequest) UnmarshalBinary ¶
func (m *UpdateGatewayRequest) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type UserAttributeMapping ¶
type UserAttributeMapping struct { // If enabled, the decoder makes the following "weak" conversions: // // Bools to string (true = "1", false = "0") // // numbers to string (base 10) // // bools to int/uint (true = 1, false = 0) // // strings to int/uint (base implied by prefix) // // int to bool (true if value != 0) // // string to bool (accepts only the following: 1, t, T, TRUE, true, True, 0, f, F, FALSE, false, False) // // empty array = empty map and vice versa // // negative numbers to overflowed uint values (base 10) // // slice of maps to a merged map // // single values are converted to slices if required. Each element is weakly decoded. // Example: false AllowWeakDecoding bool `json:"allow_weak_decoding,omitempty" yaml:"allow_weak_decoding,omitempty"` // mode Mode MappingMode `json:"mode,omitempty" yaml:"mode,omitempty"` // Source attribute. // // Source path to the attribute(s) which should be copied to the authentication context. // Use '.' to copy everything. // Required for dynamic mode. // Example: access_token Source string `json:"source,omitempty" yaml:"source,omitempty"` // When static mode is used, this field contains a value that will be populated into a target attribute. Static interface{} `json:"static,omitempty" yaml:"static,omitempty"` // Target attribute. // // Target path in the authentication context where source attribute(s) should be pasted. // Use '.' to paste to the context top level object. // Example: . // Required: true Target string `json:"target" yaml:"target"` // Type of the target attribute // // The `type` parameter accepts the following values: // `number`, `string`, `bool`, `number_array`, `string_array`, `bool_array`, `any`. // Example: string // Required: true Type string `json:"type" yaml:"type"` // update on sign in UpdateOnSignIn bool `json:"update_on_sign_in,omitempty" yaml:"update_on_sign_in,omitempty"` }
UserAttributeMapping user attribute mapping
swagger:model UserAttributeMapping
func (*UserAttributeMapping) ContextValidate ¶
ContextValidate validate this user attribute mapping based on the context it is used
func (*UserAttributeMapping) MarshalBinary ¶
func (m *UserAttributeMapping) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*UserAttributeMapping) UnmarshalBinary ¶
func (m *UserAttributeMapping) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type UserAttributesMapping ¶
type UserAttributesMapping []*UserAttributeMapping
UserAttributesMapping user attributes mapping
swagger:model UserAttributesMapping
func (UserAttributesMapping) ContextValidate ¶
ContextValidate validate this user attributes mapping based on the context it is used
type UserAuthenticatedPayload ¶
type UserAuthenticatedPayload struct { // authn method // Enum: ["totp","password","otp","webauthn"] AuthnMethod string `json:"authn_method,omitempty" yaml:"authn_method,omitempty"` // failure reason FailureReason string `json:"failure_reason,omitempty" yaml:"failure_reason,omitempty"` // identifier Identifier string `json:"identifier,omitempty" yaml:"identifier,omitempty"` // mfa // Enum: ["totp","password","otp","webauthn"] Mfa string `json:"mfa,omitempty" yaml:"mfa,omitempty"` // mfa skipped MfaSkipped bool `json:"mfa_skipped,omitempty" yaml:"mfa_skipped,omitempty"` // password mode PasswordMode bool `json:"password_mode,omitempty" yaml:"password_mode,omitempty"` // success // Required: true Success bool `json:"success" yaml:"success"` }
UserAuthenticatedPayload UserAuthenticatedPayload user authenticated payload
swagger:model UserAuthenticatedPayload
func (*UserAuthenticatedPayload) ContextValidate ¶
func (m *UserAuthenticatedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this user authenticated payload based on context it is used
func (*UserAuthenticatedPayload) MarshalBinary ¶
func (m *UserAuthenticatedPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*UserAuthenticatedPayload) UnmarshalBinary ¶
func (m *UserAuthenticatedPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type UserCodeCharacterSet ¶
type UserCodeCharacterSet string
UserCodeCharacterSet user code character set
swagger:model UserCodeCharacterSet
func (UserCodeCharacterSet) ContextValidate ¶
ContextValidate validates this user code character set based on context it is used
type UserIDAndIdentifierPayload ¶
type UserIDAndIdentifierPayload struct { // code id CodeID string `json:"code_id,omitempty" yaml:"code_id,omitempty"` // failure reason FailureReason string `json:"failure_reason,omitempty" yaml:"failure_reason,omitempty"` // identifier Identifier string `json:"identifier,omitempty" yaml:"identifier,omitempty"` // operation type OperationType string `json:"operation_type,omitempty" yaml:"operation_type,omitempty"` // user id UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"` }
UserIDAndIdentifierPayload UserIDAndIdentifierPayload user ID and identifier payload
swagger:model UserIDAndIdentifierPayload
func (*UserIDAndIdentifierPayload) ContextValidate ¶
func (m *UserIDAndIdentifierPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this user ID and identifier payload based on context it is used
func (*UserIDAndIdentifierPayload) MarshalBinary ¶
func (m *UserIDAndIdentifierPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*UserIDAndIdentifierPayload) UnmarshalBinary ¶
func (m *UserIDAndIdentifierPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type UserOrganizationsResponse ¶
type UserOrganizationsResponse struct { // cursor Cursor Cursor `json:"cursor,omitempty" yaml:"cursor,omitempty"` // organizations Organizations []*OrganizationResponse `json:"organizations" yaml:"organizations"` }
UserOrganizationsResponse user organizations response
swagger:model UserOrganizationsResponse
func (*UserOrganizationsResponse) ContextValidate ¶
func (m *UserOrganizationsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this user organizations response based on the context it is used
func (*UserOrganizationsResponse) MarshalBinary ¶
func (m *UserOrganizationsResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*UserOrganizationsResponse) UnmarshalBinary ¶
func (m *UserOrganizationsResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type UserPayload ¶
type UserPayload struct { // address Address string `json:"address,omitempty" yaml:"address,omitempty"` // identifier Identifier string `json:"identifier,omitempty" yaml:"identifier,omitempty"` // identifiers Identifiers []string `json:"identifiers" yaml:"identifiers"` // payload Payload map[string]interface{} `json:"payload,omitempty" yaml:"payload,omitempty"` // status // Enum: ["active","inactive","deleted","new"] Status string `json:"status,omitempty" yaml:"status,omitempty"` // update details UpdateDetails string `json:"update_details,omitempty" yaml:"update_details,omitempty"` // user addresses UserAddresses []*EventAddress `json:"user_addresses" yaml:"user_addresses"` // user id UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"` // user identifiers UserIdentifiers []*EventIdentifier `json:"user_identifiers" yaml:"user_identifiers"` }
UserPayload UserPayload user payload
swagger:model UserPayload
func (*UserPayload) ContextValidate ¶
ContextValidate validate this user payload based on the context it is used
func (*UserPayload) MarshalBinary ¶
func (m *UserPayload) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*UserPayload) UnmarshalBinary ¶
func (m *UserPayload) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type UserWorkspacesResponse ¶
type UserWorkspacesResponse struct { // cursor Cursor Cursor `json:"cursor,omitempty" yaml:"cursor,omitempty"` // workspaces Workspaces []*WorkspaceResponse `json:"workspaces" yaml:"workspaces"` }
UserWorkspacesResponse user workspaces response
swagger:model UserWorkspacesResponse
func (*UserWorkspacesResponse) ContextValidate ¶
func (m *UserWorkspacesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this user workspaces response based on the context it is used
func (*UserWorkspacesResponse) MarshalBinary ¶
func (m *UserWorkspacesResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*UserWorkspacesResponse) UnmarshalBinary ¶
func (m *UserWorkspacesResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ValidateResponseValidatorFailure ¶
type ValidateResponseValidatorFailure struct { // details Details string `json:"details,omitempty" yaml:"details,omitempty"` // message Message string `json:"message,omitempty" yaml:"message,omitempty"` // validator Validator string `json:"validator,omitempty" yaml:"validator,omitempty"` }
ValidateResponseValidatorFailure validate response validator failure
swagger:model ValidateResponse_ValidatorFailure
func (*ValidateResponseValidatorFailure) ContextValidate ¶
func (m *ValidateResponseValidatorFailure) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this validate response validator failure based on context it is used
func (*ValidateResponseValidatorFailure) MarshalBinary ¶
func (m *ValidateResponseValidatorFailure) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ValidateResponseValidatorFailure) UnmarshalBinary ¶
func (m *ValidateResponseValidatorFailure) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type ValidatorConfig ¶
type ValidatorConfig struct { // Configuration of the validator provided in the JSON format // // Validators configuration is an array of fields where each node consists of a comparator used, // validated field, and a value for comparison. Configuration can be also branched, which means // that it is possible to create conditional validators. It allows to define complex // authorization scenarios based on the results from other policy validators. Conf map[string]interface{} `json:"conf,omitempty" yaml:"conf,omitempty"` // The name of your validator // Example: identity-context Name string `json:"name,omitempty" yaml:"name,omitempty"` // recovery Recovery []*RecoveryConfig `json:"recovery" yaml:"recovery"` }
ValidatorConfig Configuration of a policy validator
Depending on the type of a policy different validators are available.
swagger:model ValidatorConfig
func (*ValidatorConfig) ContextValidate ¶
ContextValidate validate this validator config based on the context it is used
func (*ValidatorConfig) MarshalBinary ¶
func (m *ValidatorConfig) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*ValidatorConfig) UnmarshalBinary ¶
func (m *ValidatorConfig) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type VanityDomain ¶
type VanityDomain struct { // api key APIKey string `json:"api_key,omitempty" yaml:"api_key,omitempty"` // base path to use with a configured vanity domain // Example: /prefix BasePath string `json:"base_path,omitempty" yaml:"base_path,omitempty"` // domain cerificate Cert string `json:"cert,omitempty" yaml:"cert,omitempty"` // vanity domain // Example: example.com // Required: true Domain string `json:"domain" yaml:"domain"` // ID ID string `json:"id,omitempty" yaml:"id,omitempty"` // domain private key Key string `json:"key,omitempty" yaml:"key,omitempty"` // Unique identifier of an authorization server (workspace) // Example: default ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"` // ID of a tenant // Example: default TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type Type VanityDomainType `json:"type,omitempty" yaml:"type,omitempty"` }
VanityDomain vanity domain
swagger:model VanityDomain
func (*VanityDomain) ContextValidate ¶
ContextValidate validate this vanity domain based on the context it is used
func (*VanityDomain) MarshalBinary ¶
func (m *VanityDomain) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*VanityDomain) UnmarshalBinary ¶
func (m *VanityDomain) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type VanityDomainType ¶
type VanityDomainType string
VanityDomainType vanity domain type
swagger:model VanityDomainType
func (VanityDomainType) ContextValidate ¶
ContextValidate validates this vanity domain type based on context it is used
type Webhook ¶
type Webhook struct { // Active Active bool `json:"active,omitempty" yaml:"active,omitempty"` // API Key APIKey string `json:"api_key,omitempty" yaml:"api_key,omitempty"` // events Events map[string][]string `json:"events,omitempty" yaml:"events,omitempty"` // Insecure Insecure bool `json:"insecure,omitempty" yaml:"insecure,omitempty"` // ID of the server // Required: true ServerID string `json:"server_id" yaml:"server_id"` // ID of the tenant // Example: default // Required: true TenantID string `json:"tenant_id" yaml:"tenant_id"` // url of the Webhook URL string `json:"url,omitempty" yaml:"url,omitempty"` // ID to the Webhook // Required: true WebhookID string `json:"webhook_id" yaml:"webhook_id"` }
Webhook Custom Branding Webhook
swagger:model Webhook
func (*Webhook) ContextValidate ¶
ContextValidate validates this webhook based on context it is used
func (*Webhook) MarshalBinary ¶
MarshalBinary interface implementation
func (*Webhook) UnmarshalBinary ¶
UnmarshalBinary interface implementation
type WebhookOnCreateResponse ¶
type WebhookOnCreateResponse struct { // Active Active bool `json:"active,omitempty" yaml:"active,omitempty"` // API Key APIKey string `json:"api_key,omitempty" yaml:"api_key,omitempty"` // events Events map[string][]string `json:"events,omitempty" yaml:"events,omitempty"` // Insecure Insecure bool `json:"insecure,omitempty" yaml:"insecure,omitempty"` // url of the Webhook URL string `json:"url,omitempty" yaml:"url,omitempty"` // ID to the Webhook WebhookID string `json:"webhook_id,omitempty" yaml:"webhook_id,omitempty"` }
WebhookOnCreateResponse Wevhook object on create
swagger:model WebhookOnCreateResponse
func (*WebhookOnCreateResponse) ContextValidate ¶
func (m *WebhookOnCreateResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this webhook on create response based on context it is used
func (*WebhookOnCreateResponse) MarshalBinary ¶
func (m *WebhookOnCreateResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*WebhookOnCreateResponse) UnmarshalBinary ¶
func (m *WebhookOnCreateResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type WebhookResponse ¶
type WebhookResponse struct { // Active Active bool `json:"active,omitempty" yaml:"active,omitempty"` // events Events map[string][]string `json:"events,omitempty" yaml:"events,omitempty"` // Insecure Insecure bool `json:"insecure,omitempty" yaml:"insecure,omitempty"` // url of the Webhook URL string `json:"url,omitempty" yaml:"url,omitempty"` // ID to the Webhook WebhookID string `json:"webhook_id,omitempty" yaml:"webhook_id,omitempty"` }
WebhookResponse Webhook object on list or get
swagger:model WebhookResponse
func (*WebhookResponse) ContextValidate ¶
ContextValidate validates this webhook response based on context it is used
func (*WebhookResponse) MarshalBinary ¶
func (m *WebhookResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*WebhookResponse) UnmarshalBinary ¶
func (m *WebhookResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type WebhooksResponse ¶
type WebhooksResponse struct { // list of Webhooks // in:body Webhooks []*WebhookResponse `json:"webhooks" yaml:"webhooks"` }
WebhooksResponse Webhooks
swagger:model WebhooksResponse
func (*WebhooksResponse) ContextValidate ¶
ContextValidate validate this webhooks response based on the context it is used
func (*WebhooksResponse) MarshalBinary ¶
func (m *WebhooksResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*WebhooksResponse) UnmarshalBinary ¶
func (m *WebhooksResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type WorkspaceIDP ¶
type WorkspaceIDP struct { // attributes Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"` // ID of the authorization server (workspace) to which the IDP is connected AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"` // Client application ID // // It serves as a reference to a client application that is created in the System authorization // server (workspace), when a custom login page is created. ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"` // config Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"` // If set to `true`, the IDP is disabled // // When an IDP is disabled, it is not available for the users to be used. It is also not // displayed on the login page. Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"` // discovery settings DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"` // Can be used to e.g. modify the order in which the Identity Providers are presented on the login page. // Example: 1 DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"` // If set to `true`, the IDP is not displayed on the login page. // // When an IDP is hidden, it will not be displayed on the login page. It can still be used // and script extensions can enabled it. Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"` // Unique ID of your identity provider // // If not provided, a random ID is generated. ID string `json:"id,omitempty" yaml:"id,omitempty"` // ID of the Identity Pool to which the IDP is connected IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // jit Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // mappings Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"` // Defines the type of an IDP // // Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it // with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for // custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which // is a static IDP, to create an IDP for testing purposes. Method string `json:"method,omitempty" yaml:"method,omitempty"` // Display name of your IDP Name string `json:"name,omitempty" yaml:"name,omitempty"` // Points to the ID of the custom app, null if not set PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"` // sso settings SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"` // Authentication method reference // // An array of case sensitive strings for authentication methods that are used in the user // authentication. // // For example, an IDP may require the user to provide a biometric authentication using facial // recognition. For that, the value of the authentication method reference is `face`. StaticAmr []string `json:"static_amr" yaml:"static_amr"` // ID of the tenant where an IDP is connected TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // token exchange settings TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"` // IDP version to track internal changes // version that is currently supported: 3 Version int64 `json:"version,omitempty" yaml:"version,omitempty"` // ID of the Workspace to which the IDP is connected WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
WorkspaceIDP workspace ID p
swagger:model WorkspaceIDP
func (*WorkspaceIDP) ContextValidate ¶
ContextValidate validate this workspace ID p based on the context it is used
func (*WorkspaceIDP) MarshalBinary ¶
func (m *WorkspaceIDP) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*WorkspaceIDP) UnmarshalBinary ¶
func (m *WorkspaceIDP) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type WorkspaceMetadata ¶
type WorkspaceMetadata struct { // payload Payload map[string]interface{} `json:"payload,omitempty" yaml:"payload,omitempty"` }
WorkspaceMetadata workspace metadata
swagger:model WorkspaceMetadata
func (*WorkspaceMetadata) ContextValidate ¶
ContextValidate validates this workspace metadata based on context it is used
func (*WorkspaceMetadata) MarshalBinary ¶
func (m *WorkspaceMetadata) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*WorkspaceMetadata) UnmarshalBinary ¶
func (m *WorkspaceMetadata) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type WorkspacePermissionsResponse ¶
type WorkspacePermissionsResponse struct { // create identity pool CreateIdentityPool bool `json:"create_identity_pool,omitempty" yaml:"create_identity_pool,omitempty"` // delete organization DeleteOrganization bool `json:"delete_organization,omitempty" yaml:"delete_organization,omitempty"` // delete workspace DeleteWorkspace bool `json:"delete_workspace,omitempty" yaml:"delete_workspace,omitempty"` // discover workspace DiscoverWorkspace bool `json:"discover_workspace,omitempty" yaml:"discover_workspace,omitempty"` // get organization GetOrganization bool `json:"get_organization,omitempty" yaml:"get_organization,omitempty"` // get workspace GetWorkspace bool `json:"get_workspace,omitempty" yaml:"get_workspace,omitempty"` // list identity pools ListIdentityPools bool `json:"list_identity_pools,omitempty" yaml:"list_identity_pools,omitempty"` // manage acrs ManageAcrs bool `json:"manage_acrs,omitempty" yaml:"manage_acrs,omitempty"` // manage admin role ManageAdminRole bool `json:"manage_admin_role,omitempty" yaml:"manage_admin_role,omitempty"` // manage apis ManageApis bool `json:"manage_apis,omitempty" yaml:"manage_apis,omitempty"` // manage auditor role ManageAuditorRole bool `json:"manage_auditor_role,omitempty" yaml:"manage_auditor_role,omitempty"` // manage authorization details ManageAuthorizationDetails bool `json:"manage_authorization_details,omitempty" yaml:"manage_authorization_details,omitempty"` // manage claims ManageClaims bool `json:"manage_claims,omitempty" yaml:"manage_claims,omitempty"` // manage clients ManageClients bool `json:"manage_clients,omitempty" yaml:"manage_clients,omitempty"` // manage custom apps ManageCustomApps bool `json:"manage_custom_apps,omitempty" yaml:"manage_custom_apps,omitempty"` // manage gateways ManageGateways bool `json:"manage_gateways,omitempty" yaml:"manage_gateways,omitempty"` // manage idps ManageIdps bool `json:"manage_idps,omitempty" yaml:"manage_idps,omitempty"` // manage manager role ManageManagerRole bool `json:"manage_manager_role,omitempty" yaml:"manage_manager_role,omitempty"` // manage member role ManageMemberRole bool `json:"manage_member_role,omitempty" yaml:"manage_member_role,omitempty"` // manage policies ManagePolicies bool `json:"manage_policies,omitempty" yaml:"manage_policies,omitempty"` // manage scripts ManageScripts bool `json:"manage_scripts,omitempty" yaml:"manage_scripts,omitempty"` // manage secrets ManageSecrets bool `json:"manage_secrets,omitempty" yaml:"manage_secrets,omitempty"` // manage services ManageServices bool `json:"manage_services,omitempty" yaml:"manage_services,omitempty"` // manage tokens ManageTokens bool `json:"manage_tokens,omitempty" yaml:"manage_tokens,omitempty"` // manage user manager role ManageUserManagerRole bool `json:"manage_user_manager_role,omitempty" yaml:"manage_user_manager_role,omitempty"` // manage webhooks ManageWebhooks bool `json:"manage_webhooks,omitempty" yaml:"manage_webhooks,omitempty"` // read acrs ReadAcrs bool `json:"read_acrs,omitempty" yaml:"read_acrs,omitempty"` // read analytics ReadAnalytics bool `json:"read_analytics,omitempty" yaml:"read_analytics,omitempty"` // read apis ReadApis bool `json:"read_apis,omitempty" yaml:"read_apis,omitempty"` // read audit events ReadAuditEvents bool `json:"read_audit_events,omitempty" yaml:"read_audit_events,omitempty"` // read authorization details ReadAuthorizationDetails bool `json:"read_authorization_details,omitempty" yaml:"read_authorization_details,omitempty"` // read claims ReadClaims bool `json:"read_claims,omitempty" yaml:"read_claims,omitempty"` // read clients ReadClients bool `json:"read_clients,omitempty" yaml:"read_clients,omitempty"` // read custom apps ReadCustomApps bool `json:"read_custom_apps,omitempty" yaml:"read_custom_apps,omitempty"` // read gateways ReadGateways bool `json:"read_gateways,omitempty" yaml:"read_gateways,omitempty"` // read idps ReadIdps bool `json:"read_idps,omitempty" yaml:"read_idps,omitempty"` // read policies ReadPolicies bool `json:"read_policies,omitempty" yaml:"read_policies,omitempty"` // read roles ReadRoles bool `json:"read_roles,omitempty" yaml:"read_roles,omitempty"` // read scripts ReadScripts bool `json:"read_scripts,omitempty" yaml:"read_scripts,omitempty"` // read secrets ReadSecrets bool `json:"read_secrets,omitempty" yaml:"read_secrets,omitempty"` // read services ReadServices bool `json:"read_services,omitempty" yaml:"read_services,omitempty"` // read webhooks ReadWebhooks bool `json:"read_webhooks,omitempty" yaml:"read_webhooks,omitempty"` // update organization UpdateOrganization bool `json:"update_organization,omitempty" yaml:"update_organization,omitempty"` // update organization metadata UpdateOrganizationMetadata bool `json:"update_organization_metadata,omitempty" yaml:"update_organization_metadata,omitempty"` // update workspace UpdateWorkspace bool `json:"update_workspace,omitempty" yaml:"update_workspace,omitempty"` // update workspace metadata UpdateWorkspaceMetadata bool `json:"update_workspace_metadata,omitempty" yaml:"update_workspace_metadata,omitempty"` }
WorkspacePermissionsResponse workspace permissions response
swagger:model WorkspacePermissionsResponse
func (*WorkspacePermissionsResponse) ContextValidate ¶
func (m *WorkspacePermissionsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validates this workspace permissions response based on context it is used
func (*WorkspacePermissionsResponse) MarshalBinary ¶
func (m *WorkspacePermissionsResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*WorkspacePermissionsResponse) UnmarshalBinary ¶
func (m *WorkspacePermissionsResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type WorkspaceResponse ¶
type WorkspaceResponse struct { // Your server's label color in a HEX format. // Example: #007FFF Color string `json:"color,omitempty" yaml:"color,omitempty"` // Display description of the workspace // Example: Server description Description string `json:"description,omitempty" yaml:"description,omitempty"` // Unique identifier of an workspace // Example: default ID string `json:"id,omitempty" yaml:"id,omitempty"` // issuer url IssuerURL string `json:"issuer_url,omitempty" yaml:"issuer_url,omitempty"` // Logo URI LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"` // metadata Metadata *ServerMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"` // Display name of the workspace // // If not provided, a random ID is generated. // Example: default Name string `json:"name,omitempty" yaml:"name,omitempty"` // number of child organizations NumberOfChildOrganizations int64 `json:"number_of_child_organizations,omitempty" yaml:"number_of_child_organizations,omitempty"` // The profile of a server // // ACP is delivered with preconfigured workspace templates that enable quick and easy setup for // specific configuration patterns. For example, you can instantly create an Open Banking // compliant workspace that has all of the required mechanisms and settings already in place. // Example: default // Enum: ["default","demo","workforce","consumer","partners","third_party","fapi_advanced","fapi_rw","fapi_ro","openbanking_uk_fapi_advanced","openbanking_uk","openbanking_br","openbanking_br_unico","cdr_australia","cdr_australia_fapi_rw","fdx","openbanking_ksa","fapi_20_security","fapi_20_message_signing","connect_id"] Profile string `json:"profile,omitempty" yaml:"profile,omitempty"` // Subject format // Enum: ["hash","legacy"] SubjectFormat string `json:"subject_format,omitempty" yaml:"subject_format,omitempty"` // Subject identifier algorithm salt SubjectIdentifierAlgorithmSalt string `json:"subject_identifier_algorithm_salt,omitempty" yaml:"subject_identifier_algorithm_salt,omitempty"` // template Template bool `json:"template,omitempty" yaml:"template,omitempty"` // optional theme id ThemeID string `json:"theme_id,omitempty" yaml:"theme_id,omitempty"` // Server type // // It is an internal property used to recognize if the server is created for an admin portal, // a developer portal, or if it is a system or a regular workspace. // Example: regular // Enum: ["admin","developer","system","regular","organization"] Type string `json:"type,omitempty" yaml:"type,omitempty"` }
WorkspaceResponse workspace response
swagger:model WorkspaceResponse
func (*WorkspaceResponse) ContextValidate ¶
ContextValidate validate this workspace response based on the context it is used
func (*WorkspaceResponse) MarshalBinary ¶
func (m *WorkspaceResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*WorkspaceResponse) UnmarshalBinary ¶
func (m *WorkspaceResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type WorkspaceRoleSubject ¶
type WorkspaceRoleSubject struct { // identity pool user pool id IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"` // identity pool user id IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"` // idp user idp id IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"` // roles Roles *WorkspaceRoles `json:"roles,omitempty" yaml:"roles,omitempty"` // tenant id TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"` // type // Enum: ["identity_pool_user","idp"] Type string `json:"type,omitempty" yaml:"type,omitempty"` // idp user workspace id WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"` }
WorkspaceRoleSubject workspace role subject
swagger:model WorkspaceRoleSubject
func (*WorkspaceRoleSubject) ContextValidate ¶
ContextValidate validate this workspace role subject based on the context it is used
func (*WorkspaceRoleSubject) MarshalBinary ¶
func (m *WorkspaceRoleSubject) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*WorkspaceRoleSubject) UnmarshalBinary ¶
func (m *WorkspaceRoleSubject) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type WorkspaceRoles ¶
type WorkspaceRoles struct { // admin Admin bool `json:"admin,omitempty" yaml:"admin,omitempty"` // auditor Auditor bool `json:"auditor,omitempty" yaml:"auditor,omitempty"` // manager Manager bool `json:"manager,omitempty" yaml:"manager,omitempty"` // member Member bool `json:"member,omitempty" yaml:"member,omitempty"` // user manager UserManager bool `json:"user_manager,omitempty" yaml:"user_manager,omitempty"` }
WorkspaceRoles workspace roles
swagger:model WorkspaceRoles
func (*WorkspaceRoles) ContextValidate ¶
ContextValidate validates this workspace roles based on context it is used
func (*WorkspaceRoles) MarshalBinary ¶
func (m *WorkspaceRoles) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*WorkspaceRoles) UnmarshalBinary ¶
func (m *WorkspaceRoles) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type WorkspaceRolesResponse ¶
type WorkspaceRolesResponse struct { // subjects Subjects []*WorkspaceRoleSubject `json:"subjects" yaml:"subjects"` }
WorkspaceRolesResponse workspace roles response
swagger:model WorkspaceRolesResponse
func (*WorkspaceRolesResponse) ContextValidate ¶
func (m *WorkspaceRolesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error
ContextValidate validate this workspace roles response based on the context it is used
func (*WorkspaceRolesResponse) MarshalBinary ¶
func (m *WorkspaceRolesResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*WorkspaceRolesResponse) UnmarshalBinary ¶
func (m *WorkspaceRolesResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type WorkspacesResponse ¶
type WorkspacesResponse struct { // workspaces Workspaces []*WorkspaceResponse `json:"workspaces" yaml:"workspaces"` }
WorkspacesResponse workspaces response
swagger:model WorkspacesResponse
func (*WorkspacesResponse) ContextValidate ¶
ContextValidate validate this workspaces response based on the context it is used
func (*WorkspacesResponse) MarshalBinary ¶
func (m *WorkspacesResponse) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*WorkspacesResponse) UnmarshalBinary ¶
func (m *WorkspacesResponse) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type X509Certificate ¶
type X509Certificate struct { // data Data string `json:"Data,omitempty" yaml:"Data,omitempty"` // XML name XMLName *Name `json:"XMLName,omitempty" yaml:"XMLName,omitempty"` }
X509Certificate X509Certificate represents the XMLSEC object of the same name
swagger:model X509Certificate
func (*X509Certificate) ContextValidate ¶
ContextValidate validate this x509 certificate based on the context it is used
func (*X509Certificate) MarshalBinary ¶
func (m *X509Certificate) MarshalBinary() ([]byte, error)
MarshalBinary interface implementation
func (*X509Certificate) UnmarshalBinary ¶
func (m *X509Certificate) UnmarshalBinary(b []byte) error
UnmarshalBinary interface implementation
type X509Data ¶
type X509Data struct { // x509 certificates X509Certificates []*X509Certificate `json:"X509Certificates" yaml:"X509Certificates"` // XML name XMLName *Name `json:"XMLName,omitempty" yaml:"XMLName,omitempty"` }
X509Data X509Data represents the XMLSEC object of the same name
swagger:model X509Data
func (*X509Data) ContextValidate ¶
ContextValidate validate this x509 data based on the context it is used
func (*X509Data) MarshalBinary ¶
MarshalBinary interface implementation
func (*X509Data) UnmarshalBinary ¶
UnmarshalBinary interface implementation
Source Files
¶
- a_c_r.go
- a_c_rs.go
- a_p_is.go
- a_w_s_metadata.go
- access_request_data.go
- access_request_data_with_error.go
- advanced_configuration.go
- affiliation_descriptor.go
- api.go
- api_group_metadata.go
- apigee_metadata.go
- arculix_auth.go
- attr.go
- attribute.go
- attribute_authority_descriptor.go
- attribute_consuming_service.go
- attribute_value.go
- attributes.go
- audit_consent_kind.go
- audit_event.go
- audit_event_metadata.go
- audit_event_payloads.go
- audit_events.go
- auth0_credentials.go
- auth0_id_p.go
- auth0_settings.go
- authentication_context.go
- authentication_context_attribute.go
- authentication_context_settings.go
- authentication_mechanisms.go
- authn_authority_descriptor.go
- authorization_detail.go
- authorization_detail_type.go
- authorization_detail_with_service.go
- authorization_detail_with_service_id.go
- authorization_details_with_services.go
- automatic_key_rotation.go
- available_events.go
- azure_b2_c_credentials.go
- azure_b2_c_id_p.go
- azure_b2_c_settings.go
- azure_credentials.go
- azure_id_p.go
- azure_metadata.go
- azure_settings.go
- b_r_consent_payload.go
- bind_group_to_service_request.go
- bind_system_api_request.go
- brute_force_limit.go
- brute_force_limits.go
- c_d_r_arrangement.go
- c_d_r_arrangement_id.go
- c_d_r_arrangement_metadata.go
- c_d_r_arrangements_auto_removal.go
- c_d_r_configuration.go
- c_d_r_customer_id.go
- c_d_r_industry.go
- c_d_r_register_api_version.go
- c_d_r_register_url.go
- c_i_b_a_authentication_service.go
- certificate_info.go
- claim.go
- claim_grant.go
- claim_source_type.go
- claim_type.go
- claims.go
- claims_granted_payload.go
- client.go
- client_admin_response.go
- client_audit_payload.go
- client_consents_audit_event_payload.go
- client_j_w_k.go
- client_j_w_ks.go
- client_privacy.go
- client_token_exchange_configuration.go
- clients_for_admin.go
- cognito_credentials.go
- cognito_id_p.go
- cognito_settings.go
- config_import_event_payload.go
- confirmation.go
- consent.go
- consent_action.go
- consent_action_to_consent.go
- consent_action_with_consents.go
- consent_actions.go
- consent_audit_event_payload.go
- consent_details.go
- consent_grant_context.go
- consent_granted_event.go
- consent_notified_payload.go
- consent_payload.go
- consent_revoked_event.go
- consent_service.go
- consent_status.go
- consent_type.go
- consents.go
- contact_person.go
- cookies_configuration.go
- create_client_admin_request.go
- create_gateway_request.go
- create_organization_request.go
- credential_payload.go
- cross_tenant_api_policy_binding.go
- cursor.go
- custom_app.go
- custom_app_response.go
- custom_apps_response.go
- custom_credentials.go
- custom_id_p.go
- custom_server_consent.go
- custom_settings.go
- customer_consents_audit_event_payload.go
- d_c_r_created_event_payload.go
- d_c_r_details.go
- d_c_r_rejected_event_payload.go
- default_brute_force_limit.go
- default_brute_force_limits.go
- default_email_settings.go
- default_s_m_s_settings.go
- device_authorization_configuration.go
- duration.go
- duration_type.go
- dynamic_client_registration_settings.go
- element.go
- email_auth.go
- email_settings.go
- encryption_method.go
- endpoint.go
- entity_descriptor.go
- environment.go
- error.go
- event.go
- event_address.go
- event_identifier.go
- event_subject.go
- extended_role_resource.go
- external_c_i_b_a_authentication_service.go
- external_credentials.go
- external_id_p.go
- external_service_credentials.go
- external_settings.go
- f_d_x_client_status.go
- f_d_x_configuration.go
- f_d_x_consent.go
- f_d_x_consent_grant_party.go
- f_d_x_consent_id.go
- f_d_x_consent_revocation.go
- f_d_x_granted_resource.go
- f_d_x_metadata.go
- f_d_x_party.go
- f_d_x_requested_resource.go
- feature_response.go
- features_response.go
- fn_env_version.go
- gateway.go
- gateway_api.go
- gateway_api_group.go
- gateway_api_groups.go
- gateway_token_exchange_settings.go
- gateway_with_client.go
- gateways.go
- github_credentials.go
- github_embedded_id_p.go
- github_id_p.go
- github_settings.go
- google_credentials.go
- google_embedded_id_p.go
- google_id_p.go
- google_settings.go
- grant_identity_pool_role_request.go
- grant_tenant_role_request.go
- grant_workspace_role_request.go
- graph_q_l_field.go
- graph_q_l_type.go
- graph_q_l_types.go
- http_request.go
- http_request_param.go
- id_p_base.go
- id_p_configuration.go
- id_p_discovery.go
- id_p_discovery_settings.go
- id_p_domain.go
- id_p_payload.go
- id_p_s_s_o_descriptor.go
- id_p_s_s_o_settings.go
- id_p_token_exchange_settings.go
- id_ps_response.go
- identifier_type.go
- identity_assurance_configuration.go
- identity_pool_id_p.go
- identity_pool_role_subject.go
- identity_pool_roles.go
- identity_pool_roles_response.go
- image.go
- images.go
- import_service_configuration_result.go
- indexed_endpoint.go
- initial_access_token_settings.go
- intelli_trust_credentials.go
- intelli_trust_id_p.go
- intelli_trust_settings.go
- intermediary.go
- j_i_t_adress_verification_mode.go
- j_i_t_created_payload.go
- j_i_t_failed_payload.go
- j_i_t_provisioning.go
- j_i_t_settings.go
- j_i_t_updated_payload.go
- j_i_t_user.go
- j_i_t_user_address.go
- j_i_t_user_identifier.go
- j_w_s_payload_settings.go
- jwt_claims.go
- key_descriptor.go
- key_info.go
- keys_response.go
- legal_entity.go
- license.go
- localized_name.go
- localized_uri.go
- login_failed_payload.go
- login_payload.go
- m_f_a_auth.go
- m_f_a_method.go
- m_f_a_method_response.go
- m_f_a_methods.go
- m_f_a_settings.go
- mapping.go
- mapping_mode.go
- mappings.go
- metadata.go
- name.go
- name_id.go
- name_id_format.go
- o_b_b_r_configuration.go
- o_b_b_r_industry.go
- o_b_b_r_metadata.go
- o_id_c_credentials.go
- o_id_c_id_p.go
- o_id_c_server_consent.go
- o_id_c_settings.go
- o_t_p_configuration.go
- o_t_p_payload.go
- okta_credentials.go
- okta_id_p.go
- okta_settings.go
- okta_supervisor_client.go
- openbanking_server_consent.go
- org.go
- organization.go
- organization_configuration.go
- organization_id_p.go
- organization_metadata.go
- organization_response.go
- organizations_response.go
- p_d_p_descriptor.go
- p_i_i_category.go
- payload_settings.go
- personal_details.go
- policies.go
- policy.go
- policy_evaluated_payload.go
- policy_execution_point.go
- policy_execution_points.go
- policy_payload.go
- policy_validation_failure.go
- policy_validation_recovery.go
- policy_validation_result.go
- pool_audit_payload.go
- privacy_ledger_event.go
- privacy_ledger_event_type.go
- privacy_ledger_events.go
- privacy_ledger_payload.go
- private_key_j_w_t_credentials.go
- protected_type.go
- provisioning_mode.go
- purpose.go
- recent_activities.go
- recent_activity.go
- recent_activity_payload.go
- recovery_config.go
- recovery_payload.go
- redirect_u_r_is.go
- registration_token.go
- registry_reference.go
- remove_service_configuration_result.go
- request_validated_data.go
- request_validated_payload.go
- requested_attribute.go
- response_modes.go
- response_types.go
- revocation_channel.go
- revocation_reason.go
- revoke_identity_pool_role_request.go
- revoke_tenant_role_request.go
- revoke_token_request.go
- revoke_tokens_by_pool_request.go
- revoke_workspace_role_request.go
- rfc6902_patch_operation.go
- rfc6902_patch_operations.go
- risk_context.go
- risk_id.go
- risk_l_o_a.go
- role_descriptor.go
- role_grant_audit_payload.go
- role_resource.go
- role_resources.go
- role_subject.go
- rotate_client_secret_response.go
- s_a_m_l_client_metadata_response.go
- s_a_m_l_configuration.go
- s_a_m_l_credentials.go
- s_a_m_l_id_p.go
- s_a_m_l_settings.go
- s_a_m_l_v2_credentials.go
- s_a_m_l_v2_id_p.go
- s_a_m_l_v2_settings.go
- s_m_s_auth.go
- s_m_s_settings.go
- s_p_s_s_o_descriptor.go
- s_s_o_configuration.go
- same_site.go
- schema_audit_payload.go
- scope.go
- scope_claim_format.go
- scope_grant.go
- scope_privacy_information.go
- scope_with_service.go
- scope_with_service_id.go
- scopes_granted_payload.go
- scopes_with_services.go
- script.go
- script_debug.go
- script_debugs.go
- script_execution_audit_payload.go
- script_execution_point.go
- script_execution_points.go
- script_execution_result.go
- script_runtime.go
- scripts.go
- secret.go
- secrets_response.go
- secure_options.go
- server.go
- server_a_p_is.go
- server_audit_payload.go
- server_binding_response.go
- server_consent.go
- server_consent_response.go
- server_info.go
- server_j_w_k.go
- server_j_w_ks.go
- server_metadata.go
- server_response.go
- server_settings.go
- server_to_server.go
- server_to_theme.go
- servers_bindings_response.go
- servers_response.go
- service.go
- service_audit_payload.go
- service_response.go
- service_with_audience.go
- service_with_scopes_response.go
- services_response.go
- set_beta_feature.go
- spec_version.go
- static_credentials.go
- static_id_p.go
- static_settings.go
- static_user.go
- styling.go
- supported_json_schema.go
- system_api_bindings.go
- system_services_response.go
- task_audit_payload.go
- template.go
- template_paths.go
- tenant.go
- tenant_metadata.go
- tenant_payload.go
- tenant_permissions_response.go
- tenant_role_subject.go
- tenant_roles.go
- tenant_roles_response.go
- tenant_settings.go
- test_api_result.go
- test_m_f_a_method_request.go
- test_policy_definition.go
- test_policy_input.go
- test_policy_input_request.go
- test_policy_request.go
- test_policy_response.go
- test_request.go
- test_script_request.go
- theme.go
- themes.go
- token.go
- token_t_t_ls.go
- tokens_revoked_payload.go
- trust_anchor_configuration.go
- u_k_consent_payload.go
- unbind_system_api_request.go
- update_api_request.go
- update_client_admin_request.go
- update_gateway_request.go
- user_attribute_mapping.go
- user_attributes_mapping.go
- user_authenticated_payload.go
- user_code_character_set.go
- user_id_and_identifier_payload.go
- user_organizations_response.go
- user_payload.go
- user_workspaces_response.go
- validate_response_validator_failure.go
- validator_config.go
- vanity_domain.go
- vanity_domain_type.go
- webhook.go
- webhook_on_create_response.go
- webhook_response.go
- webhooks_response.go
- workspace_id_p.go
- workspace_metadata.go
- workspace_permissions_response.go
- workspace_response.go
- workspace_role_subject.go
- workspace_roles.go
- workspace_roles_response.go
- workspaces_response.go
- x509_certificate.go
- x509_data.go