@goauthentik/api 2023.5.3-1686577333 → 2023.5.3-1687255782

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (57) hide show
  1. package/.openapi-generator/FILES +1 -0
  2. package/dist/apis/AdminApi.d.ts +8 -0
  3. package/dist/apis/AdminApi.js +28 -0
  4. package/dist/apis/PoliciesApi.d.ts +1 -0
  5. package/dist/apis/PoliciesApi.js +3 -0
  6. package/dist/esm/apis/AdminApi.d.ts +8 -0
  7. package/dist/esm/apis/AdminApi.js +28 -0
  8. package/dist/esm/apis/PoliciesApi.d.ts +1 -0
  9. package/dist/esm/apis/PoliciesApi.js +3 -0
  10. package/dist/esm/models/EventMatcherPolicy.d.ts +7 -0
  11. package/dist/esm/models/EventMatcherPolicy.js +3 -0
  12. package/dist/esm/models/EventMatcherPolicyRequest.d.ts +7 -0
  13. package/dist/esm/models/EventMatcherPolicyRequest.js +3 -0
  14. package/dist/esm/models/LDAPOutpostConfig.d.ts +8 -2
  15. package/dist/esm/models/LDAPOutpostConfig.js +2 -0
  16. package/dist/esm/models/LDAPProvider.d.ts +8 -2
  17. package/dist/esm/models/LDAPProvider.js +2 -0
  18. package/dist/esm/models/LDAPProviderRequest.d.ts +8 -2
  19. package/dist/esm/models/LDAPProviderRequest.js +2 -0
  20. package/dist/esm/models/ModelEnum.d.ts +161 -0
  21. package/dist/esm/models/ModelEnum.js +168 -0
  22. package/dist/esm/models/PatchedEventMatcherPolicyRequest.d.ts +7 -0
  23. package/dist/esm/models/PatchedEventMatcherPolicyRequest.js +3 -0
  24. package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +8 -2
  25. package/dist/esm/models/PatchedLDAPProviderRequest.js +2 -0
  26. package/dist/esm/models/index.d.ts +1 -0
  27. package/dist/esm/models/index.js +1 -0
  28. package/dist/models/EventMatcherPolicy.d.ts +7 -0
  29. package/dist/models/EventMatcherPolicy.js +3 -0
  30. package/dist/models/EventMatcherPolicyRequest.d.ts +7 -0
  31. package/dist/models/EventMatcherPolicyRequest.js +3 -0
  32. package/dist/models/LDAPOutpostConfig.d.ts +8 -2
  33. package/dist/models/LDAPOutpostConfig.js +2 -0
  34. package/dist/models/LDAPProvider.d.ts +8 -2
  35. package/dist/models/LDAPProvider.js +2 -0
  36. package/dist/models/LDAPProviderRequest.d.ts +8 -2
  37. package/dist/models/LDAPProviderRequest.js +2 -0
  38. package/dist/models/ModelEnum.d.ts +161 -0
  39. package/dist/models/ModelEnum.js +174 -0
  40. package/dist/models/PatchedEventMatcherPolicyRequest.d.ts +7 -0
  41. package/dist/models/PatchedEventMatcherPolicyRequest.js +3 -0
  42. package/dist/models/PatchedLDAPProviderRequest.d.ts +8 -2
  43. package/dist/models/PatchedLDAPProviderRequest.js +2 -0
  44. package/dist/models/index.d.ts +1 -0
  45. package/dist/models/index.js +1 -0
  46. package/package.json +1 -1
  47. package/src/apis/AdminApi.ts +30 -0
  48. package/src/apis/PoliciesApi.ts +5 -0
  49. package/src/models/EventMatcherPolicy.ts +14 -0
  50. package/src/models/EventMatcherPolicyRequest.ts +14 -0
  51. package/src/models/LDAPOutpostConfig.ts +10 -2
  52. package/src/models/LDAPProvider.ts +10 -2
  53. package/src/models/LDAPProviderRequest.ts +10 -2
  54. package/src/models/ModelEnum.ts +176 -0
  55. package/src/models/PatchedEventMatcherPolicyRequest.ts +14 -0
  56. package/src/models/PatchedLDAPProviderRequest.ts +10 -2
  57. package/src/models/index.ts +1 -0
@@ -177,6 +177,7 @@ src/models/LoginChallengeTypes.ts
177
177
  src/models/LoginMetrics.ts
178
178
  src/models/LoginSource.ts
179
179
  src/models/Metadata.ts
180
+ src/models/ModelEnum.ts
180
181
  src/models/NameIdPolicyEnum.ts
181
182
  src/models/NotConfiguredActionEnum.ts
182
183
  src/models/Notification.ts
@@ -37,6 +37,14 @@ export declare class AdminApi extends runtime.BaseAPI {
37
37
  * Login Metrics per 1h
38
38
  */
39
39
  adminMetricsRetrieve(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LoginMetrics>;
40
+ /**
41
+ * Read-only view list all installed models
42
+ */
43
+ adminModelsListRaw(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Array<App>>>;
44
+ /**
45
+ * Read-only view list all installed models
46
+ */
47
+ adminModelsList(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<App>>;
40
48
  /**
41
49
  * Get system information.
42
50
  */
@@ -85,6 +85,34 @@ class AdminApi extends runtime.BaseAPI {
85
85
  return yield response.value();
86
86
  });
87
87
  }
88
+ /**
89
+ * Read-only view list all installed models
90
+ */
91
+ adminModelsListRaw(initOverrides) {
92
+ return __awaiter(this, void 0, void 0, function* () {
93
+ const queryParameters = {};
94
+ const headerParameters = {};
95
+ if (this.configuration && this.configuration.apiKey) {
96
+ headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
97
+ }
98
+ const response = yield this.request({
99
+ path: `/admin/models/`,
100
+ method: 'GET',
101
+ headers: headerParameters,
102
+ query: queryParameters,
103
+ }, initOverrides);
104
+ return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(models_1.AppFromJSON));
105
+ });
106
+ }
107
+ /**
108
+ * Read-only view list all installed models
109
+ */
110
+ adminModelsList(initOverrides) {
111
+ return __awaiter(this, void 0, void 0, function* () {
112
+ const response = yield this.adminModelsListRaw(initOverrides);
113
+ return yield response.value();
114
+ });
115
+ }
88
116
  /**
89
117
  * Get system information.
90
118
  */
@@ -112,6 +112,7 @@ export interface PoliciesEventMatcherListRequest {
112
112
  created?: Date;
113
113
  executionLogging?: boolean;
114
114
  lastUpdated?: Date;
115
+ model?: string;
115
116
  name?: string;
116
117
  ordering?: string;
117
118
  page?: number;
@@ -886,6 +886,9 @@ class PoliciesApi extends runtime.BaseAPI {
886
886
  if (requestParameters.lastUpdated !== undefined) {
887
887
  queryParameters['last_updated'] = requestParameters.lastUpdated.toISOString();
888
888
  }
889
+ if (requestParameters.model !== undefined) {
890
+ queryParameters['model'] = requestParameters.model;
891
+ }
889
892
  if (requestParameters.name !== undefined) {
890
893
  queryParameters['name'] = requestParameters.name;
891
894
  }
@@ -37,6 +37,14 @@ export declare class AdminApi extends runtime.BaseAPI {
37
37
  * Login Metrics per 1h
38
38
  */
39
39
  adminMetricsRetrieve(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LoginMetrics>;
40
+ /**
41
+ * Read-only view list all installed models
42
+ */
43
+ adminModelsListRaw(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Array<App>>>;
44
+ /**
45
+ * Read-only view list all installed models
46
+ */
47
+ adminModelsList(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<App>>;
40
48
  /**
41
49
  * Get system information.
42
50
  */
@@ -82,6 +82,34 @@ export class AdminApi extends runtime.BaseAPI {
82
82
  return yield response.value();
83
83
  });
84
84
  }
85
+ /**
86
+ * Read-only view list all installed models
87
+ */
88
+ adminModelsListRaw(initOverrides) {
89
+ return __awaiter(this, void 0, void 0, function* () {
90
+ const queryParameters = {};
91
+ const headerParameters = {};
92
+ if (this.configuration && this.configuration.apiKey) {
93
+ headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
94
+ }
95
+ const response = yield this.request({
96
+ path: `/admin/models/`,
97
+ method: 'GET',
98
+ headers: headerParameters,
99
+ query: queryParameters,
100
+ }, initOverrides);
101
+ return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(AppFromJSON));
102
+ });
103
+ }
104
+ /**
105
+ * Read-only view list all installed models
106
+ */
107
+ adminModelsList(initOverrides) {
108
+ return __awaiter(this, void 0, void 0, function* () {
109
+ const response = yield this.adminModelsListRaw(initOverrides);
110
+ return yield response.value();
111
+ });
112
+ }
85
113
  /**
86
114
  * Get system information.
87
115
  */
@@ -112,6 +112,7 @@ export interface PoliciesEventMatcherListRequest {
112
112
  created?: Date;
113
113
  executionLogging?: boolean;
114
114
  lastUpdated?: Date;
115
+ model?: string;
115
116
  name?: string;
116
117
  ordering?: string;
117
118
  page?: number;
@@ -883,6 +883,9 @@ export class PoliciesApi extends runtime.BaseAPI {
883
883
  if (requestParameters.lastUpdated !== undefined) {
884
884
  queryParameters['last_updated'] = requestParameters.lastUpdated.toISOString();
885
885
  }
886
+ if (requestParameters.model !== undefined) {
887
+ queryParameters['model'] = requestParameters.model;
888
+ }
886
889
  if (requestParameters.name !== undefined) {
887
890
  queryParameters['name'] = requestParameters.name;
888
891
  }
@@ -11,6 +11,7 @@
11
11
  */
12
12
  import type { AppEnum } from './AppEnum';
13
13
  import type { EventActions } from './EventActions';
14
+ import type { ModelEnum } from './ModelEnum';
14
15
  /**
15
16
  * Event Matcher Policy Serializer
16
17
  * @export
@@ -83,6 +84,12 @@ export interface EventMatcherPolicy {
83
84
  * @memberof EventMatcherPolicy
84
85
  */
85
86
  app?: AppEnum;
87
+ /**
88
+ *
89
+ * @type {ModelEnum}
90
+ * @memberof EventMatcherPolicy
91
+ */
92
+ model?: ModelEnum;
86
93
  }
87
94
  /**
88
95
  * Check if a given object implements the EventMatcherPolicy interface.
@@ -14,6 +14,7 @@
14
14
  import { exists } from '../runtime';
15
15
  import { AppEnumFromJSON, AppEnumToJSON, } from './AppEnum';
16
16
  import { EventActionsFromJSON, EventActionsToJSON, } from './EventActions';
17
+ import { ModelEnumFromJSON, ModelEnumToJSON, } from './ModelEnum';
17
18
  /**
18
19
  * Check if a given object implements the EventMatcherPolicy interface.
19
20
  */
@@ -47,6 +48,7 @@ export function EventMatcherPolicyFromJSONTyped(json, ignoreDiscriminator) {
47
48
  'action': !exists(json, 'action') ? undefined : EventActionsFromJSON(json['action']),
48
49
  'clientIp': !exists(json, 'client_ip') ? undefined : json['client_ip'],
49
50
  'app': !exists(json, 'app') ? undefined : AppEnumFromJSON(json['app']),
51
+ 'model': !exists(json, 'model') ? undefined : ModelEnumFromJSON(json['model']),
50
52
  };
51
53
  }
52
54
  export function EventMatcherPolicyToJSON(value) {
@@ -62,5 +64,6 @@ export function EventMatcherPolicyToJSON(value) {
62
64
  'action': EventActionsToJSON(value.action),
63
65
  'client_ip': value.clientIp,
64
66
  'app': AppEnumToJSON(value.app),
67
+ 'model': ModelEnumToJSON(value.model),
65
68
  };
66
69
  }
@@ -11,6 +11,7 @@
11
11
  */
12
12
  import type { AppEnum } from './AppEnum';
13
13
  import type { EventActions } from './EventActions';
14
+ import type { ModelEnum } from './ModelEnum';
14
15
  /**
15
16
  * Event Matcher Policy Serializer
16
17
  * @export
@@ -47,6 +48,12 @@ export interface EventMatcherPolicyRequest {
47
48
  * @memberof EventMatcherPolicyRequest
48
49
  */
49
50
  app?: AppEnum;
51
+ /**
52
+ *
53
+ * @type {ModelEnum}
54
+ * @memberof EventMatcherPolicyRequest
55
+ */
56
+ model?: ModelEnum;
50
57
  }
51
58
  /**
52
59
  * Check if a given object implements the EventMatcherPolicyRequest interface.
@@ -14,6 +14,7 @@
14
14
  import { exists } from '../runtime';
15
15
  import { AppEnumFromJSON, AppEnumToJSON, } from './AppEnum';
16
16
  import { EventActionsFromJSON, EventActionsToJSON, } from './EventActions';
17
+ import { ModelEnumFromJSON, ModelEnumToJSON, } from './ModelEnum';
17
18
  /**
18
19
  * Check if a given object implements the EventMatcherPolicyRequest interface.
19
20
  */
@@ -35,6 +36,7 @@ export function EventMatcherPolicyRequestFromJSONTyped(json, ignoreDiscriminator
35
36
  'action': !exists(json, 'action') ? undefined : EventActionsFromJSON(json['action']),
36
37
  'clientIp': !exists(json, 'client_ip') ? undefined : json['client_ip'],
37
38
  'app': !exists(json, 'app') ? undefined : AppEnumFromJSON(json['app']),
39
+ 'model': !exists(json, 'model') ? undefined : ModelEnumFromJSON(json['model']),
38
40
  };
39
41
  }
40
42
  export function EventMatcherPolicyRequestToJSON(value) {
@@ -50,5 +52,6 @@ export function EventMatcherPolicyRequestToJSON(value) {
50
52
  'action': EventActionsToJSON(value.action),
51
53
  'client_ip': value.clientIp,
52
54
  'app': AppEnumToJSON(value.app),
55
+ 'model': ModelEnumToJSON(value.model),
53
56
  };
54
57
  }
@@ -65,13 +65,13 @@ export interface LDAPOutpostConfig {
65
65
  */
66
66
  tlsServerName?: string;
67
67
  /**
68
- * The start for uidNumbers, this number is added to the user.Pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
68
+ * The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
69
69
  * @type {number}
70
70
  * @memberof LDAPOutpostConfig
71
71
  */
72
72
  uidStartNumber?: number;
73
73
  /**
74
- * The start for gidNumbers, this number is added to a number generated from the group.Pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
74
+ * The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
75
75
  * @type {number}
76
76
  * @memberof LDAPOutpostConfig
77
77
  */
@@ -88,6 +88,12 @@ export interface LDAPOutpostConfig {
88
88
  * @memberof LDAPOutpostConfig
89
89
  */
90
90
  bindMode?: LDAPAPIAccessMode;
91
+ /**
92
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
93
+ * @type {boolean}
94
+ * @memberof LDAPOutpostConfig
95
+ */
96
+ mfaSupport?: boolean;
91
97
  }
92
98
  /**
93
99
  * Check if a given object implements the LDAPOutpostConfig interface.
@@ -44,6 +44,7 @@ export function LDAPOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
44
44
  'gidStartNumber': !exists(json, 'gid_start_number') ? undefined : json['gid_start_number'],
45
45
  'searchMode': !exists(json, 'search_mode') ? undefined : LDAPAPIAccessModeFromJSON(json['search_mode']),
46
46
  'bindMode': !exists(json, 'bind_mode') ? undefined : LDAPAPIAccessModeFromJSON(json['bind_mode']),
47
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
47
48
  };
48
49
  }
49
50
  export function LDAPOutpostConfigToJSON(value) {
@@ -64,5 +65,6 @@ export function LDAPOutpostConfigToJSON(value) {
64
65
  'gid_start_number': value.gidStartNumber,
65
66
  'search_mode': LDAPAPIAccessModeToJSON(value.searchMode),
66
67
  'bind_mode': LDAPAPIAccessModeToJSON(value.bindMode),
68
+ 'mfa_support': value.mfaSupport,
67
69
  };
68
70
  }
@@ -119,13 +119,13 @@ export interface LDAPProvider {
119
119
  */
120
120
  tlsServerName?: string;
121
121
  /**
122
- * The start for uidNumbers, this number is added to the user.Pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
122
+ * The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
123
123
  * @type {number}
124
124
  * @memberof LDAPProvider
125
125
  */
126
126
  uidStartNumber?: number;
127
127
  /**
128
- * The start for gidNumbers, this number is added to a number generated from the group.Pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
128
+ * The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
129
129
  * @type {number}
130
130
  * @memberof LDAPProvider
131
131
  */
@@ -148,6 +148,12 @@ export interface LDAPProvider {
148
148
  * @memberof LDAPProvider
149
149
  */
150
150
  bindMode?: LDAPAPIAccessMode;
151
+ /**
152
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
153
+ * @type {boolean}
154
+ * @memberof LDAPProvider
155
+ */
156
+ mfaSupport?: boolean;
151
157
  }
152
158
  /**
153
159
  * Check if a given object implements the LDAPProvider interface.
@@ -62,6 +62,7 @@ export function LDAPProviderFromJSONTyped(json, ignoreDiscriminator) {
62
62
  'outpostSet': json['outpost_set'],
63
63
  'searchMode': !exists(json, 'search_mode') ? undefined : LDAPAPIAccessModeFromJSON(json['search_mode']),
64
64
  'bindMode': !exists(json, 'bind_mode') ? undefined : LDAPAPIAccessModeFromJSON(json['bind_mode']),
65
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
65
66
  };
66
67
  }
67
68
  export function LDAPProviderToJSON(value) {
@@ -84,5 +85,6 @@ export function LDAPProviderToJSON(value) {
84
85
  'gid_start_number': value.gidStartNumber,
85
86
  'search_mode': LDAPAPIAccessModeToJSON(value.searchMode),
86
87
  'bind_mode': LDAPAPIAccessModeToJSON(value.bindMode),
88
+ 'mfa_support': value.mfaSupport,
87
89
  };
88
90
  }
@@ -65,13 +65,13 @@ export interface LDAPProviderRequest {
65
65
  */
66
66
  tlsServerName?: string;
67
67
  /**
68
- * The start for uidNumbers, this number is added to the user.Pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
68
+ * The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
69
69
  * @type {number}
70
70
  * @memberof LDAPProviderRequest
71
71
  */
72
72
  uidStartNumber?: number;
73
73
  /**
74
- * The start for gidNumbers, this number is added to a number generated from the group.Pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
74
+ * The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
75
75
  * @type {number}
76
76
  * @memberof LDAPProviderRequest
77
77
  */
@@ -88,6 +88,12 @@ export interface LDAPProviderRequest {
88
88
  * @memberof LDAPProviderRequest
89
89
  */
90
90
  bindMode?: LDAPAPIAccessMode;
91
+ /**
92
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
93
+ * @type {boolean}
94
+ * @memberof LDAPProviderRequest
95
+ */
96
+ mfaSupport?: boolean;
91
97
  }
92
98
  /**
93
99
  * Check if a given object implements the LDAPProviderRequest interface.
@@ -42,6 +42,7 @@ export function LDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
42
42
  'gidStartNumber': !exists(json, 'gid_start_number') ? undefined : json['gid_start_number'],
43
43
  'searchMode': !exists(json, 'search_mode') ? undefined : LDAPAPIAccessModeFromJSON(json['search_mode']),
44
44
  'bindMode': !exists(json, 'bind_mode') ? undefined : LDAPAPIAccessModeFromJSON(json['bind_mode']),
45
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
45
46
  };
46
47
  }
47
48
  export function LDAPProviderRequestToJSON(value) {
@@ -64,5 +65,6 @@ export function LDAPProviderRequestToJSON(value) {
64
65
  'gid_start_number': value.gidStartNumber,
65
66
  'search_mode': LDAPAPIAccessModeToJSON(value.searchMode),
66
67
  'bind_mode': LDAPAPIAccessModeToJSON(value.bindMode),
68
+ 'mfa_support': value.mfaSupport,
67
69
  };
68
70
  }
@@ -0,0 +1,161 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2023.5.3
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ /**
13
+ * * `authentik_crypto.certificatekeypair` - Certificate-Key Pair
14
+ * * `authentik_events.event` - Event
15
+ * * `authentik_events.notificationtransport` - Notification Transport
16
+ * * `authentik_events.notification` - Notification
17
+ * * `authentik_events.notificationrule` - Notification Rule
18
+ * * `authentik_events.notificationwebhookmapping` - Webhook Mapping
19
+ * * `authentik_flows.flow` - Flow
20
+ * * `authentik_flows.flowstagebinding` - Flow Stage Binding
21
+ * * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection
22
+ * * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection
23
+ * * `authentik_outposts.outpost` - outpost
24
+ * * `authentik_policies_dummy.dummypolicy` - Dummy Policy
25
+ * * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy
26
+ * * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy
27
+ * * `authentik_policies_expression.expressionpolicy` - Expression Policy
28
+ * * `authentik_policies_password.passwordpolicy` - Password Policy
29
+ * * `authentik_policies_reputation.reputationpolicy` - Reputation Policy
30
+ * * `authentik_policies_reputation.reputation` - reputation
31
+ * * `authentik_policies.policybinding` - Policy Binding
32
+ * * `authentik_providers_ldap.ldapprovider` - LDAP Provider
33
+ * * `authentik_providers_oauth2.scopemapping` - Scope Mapping
34
+ * * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider
35
+ * * `authentik_providers_oauth2.authorizationcode` - Authorization Code
36
+ * * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token
37
+ * * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token
38
+ * * `authentik_providers_proxy.proxyprovider` - Proxy Provider
39
+ * * `authentik_providers_radius.radiusprovider` - Radius Provider
40
+ * * `authentik_providers_saml.samlprovider` - SAML Provider
41
+ * * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping
42
+ * * `authentik_providers_scim.scimprovider` - SCIM Provider
43
+ * * `authentik_providers_scim.scimmapping` - SCIM Mapping
44
+ * * `authentik_sources_ldap.ldapsource` - LDAP Source
45
+ * * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping
46
+ * * `authentik_sources_oauth.oauthsource` - OAuth Source
47
+ * * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection
48
+ * * `authentik_sources_plex.plexsource` - Plex Source
49
+ * * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection
50
+ * * `authentik_sources_saml.samlsource` - SAML Source
51
+ * * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection
52
+ * * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage
53
+ * * `authentik_stages_authenticator_duo.duodevice` - Duo Device
54
+ * * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage
55
+ * * `authentik_stages_authenticator_sms.smsdevice` - SMS Device
56
+ * * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage
57
+ * * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage
58
+ * * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage
59
+ * * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage
60
+ * * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device
61
+ * * `authentik_stages_captcha.captchastage` - Captcha Stage
62
+ * * `authentik_stages_consent.consentstage` - Consent Stage
63
+ * * `authentik_stages_consent.userconsent` - User Consent
64
+ * * `authentik_stages_deny.denystage` - Deny Stage
65
+ * * `authentik_stages_dummy.dummystage` - Dummy Stage
66
+ * * `authentik_stages_email.emailstage` - Email Stage
67
+ * * `authentik_stages_identification.identificationstage` - Identification Stage
68
+ * * `authentik_stages_invitation.invitationstage` - Invitation Stage
69
+ * * `authentik_stages_invitation.invitation` - Invitation
70
+ * * `authentik_stages_password.passwordstage` - Password Stage
71
+ * * `authentik_stages_prompt.prompt` - Prompt
72
+ * * `authentik_stages_prompt.promptstage` - Prompt Stage
73
+ * * `authentik_stages_user_delete.userdeletestage` - User Delete Stage
74
+ * * `authentik_stages_user_login.userloginstage` - User Login Stage
75
+ * * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage
76
+ * * `authentik_stages_user_write.userwritestage` - User Write Stage
77
+ * * `authentik_tenants.tenant` - Tenant
78
+ * * `authentik_blueprints.blueprintinstance` - Blueprint Instance
79
+ * * `authentik_core.group` - group
80
+ * * `authentik_core.user` - User
81
+ * * `authentik_core.application` - Application
82
+ * * `authentik_core.token` - Token
83
+ * @export
84
+ */
85
+ export declare const ModelEnum: {
86
+ readonly CryptoCertificatekeypair: "authentik_crypto.certificatekeypair";
87
+ readonly EventsEvent: "authentik_events.event";
88
+ readonly EventsNotificationtransport: "authentik_events.notificationtransport";
89
+ readonly EventsNotification: "authentik_events.notification";
90
+ readonly EventsNotificationrule: "authentik_events.notificationrule";
91
+ readonly EventsNotificationwebhookmapping: "authentik_events.notificationwebhookmapping";
92
+ readonly FlowsFlow: "authentik_flows.flow";
93
+ readonly FlowsFlowstagebinding: "authentik_flows.flowstagebinding";
94
+ readonly OutpostsDockerserviceconnection: "authentik_outposts.dockerserviceconnection";
95
+ readonly OutpostsKubernetesserviceconnection: "authentik_outposts.kubernetesserviceconnection";
96
+ readonly OutpostsOutpost: "authentik_outposts.outpost";
97
+ readonly PoliciesDummyDummypolicy: "authentik_policies_dummy.dummypolicy";
98
+ readonly PoliciesEventMatcherEventmatcherpolicy: "authentik_policies_event_matcher.eventmatcherpolicy";
99
+ readonly PoliciesExpiryPasswordexpirypolicy: "authentik_policies_expiry.passwordexpirypolicy";
100
+ readonly PoliciesExpressionExpressionpolicy: "authentik_policies_expression.expressionpolicy";
101
+ readonly PoliciesPasswordPasswordpolicy: "authentik_policies_password.passwordpolicy";
102
+ readonly PoliciesReputationReputationpolicy: "authentik_policies_reputation.reputationpolicy";
103
+ readonly PoliciesReputationReputation: "authentik_policies_reputation.reputation";
104
+ readonly PoliciesPolicybinding: "authentik_policies.policybinding";
105
+ readonly ProvidersLdapLdapprovider: "authentik_providers_ldap.ldapprovider";
106
+ readonly ProvidersOauth2Scopemapping: "authentik_providers_oauth2.scopemapping";
107
+ readonly ProvidersOauth2Oauth2provider: "authentik_providers_oauth2.oauth2provider";
108
+ readonly ProvidersOauth2Authorizationcode: "authentik_providers_oauth2.authorizationcode";
109
+ readonly ProvidersOauth2Accesstoken: "authentik_providers_oauth2.accesstoken";
110
+ readonly ProvidersOauth2Refreshtoken: "authentik_providers_oauth2.refreshtoken";
111
+ readonly ProvidersProxyProxyprovider: "authentik_providers_proxy.proxyprovider";
112
+ readonly ProvidersRadiusRadiusprovider: "authentik_providers_radius.radiusprovider";
113
+ readonly ProvidersSamlSamlprovider: "authentik_providers_saml.samlprovider";
114
+ readonly ProvidersSamlSamlpropertymapping: "authentik_providers_saml.samlpropertymapping";
115
+ readonly ProvidersScimScimprovider: "authentik_providers_scim.scimprovider";
116
+ readonly ProvidersScimScimmapping: "authentik_providers_scim.scimmapping";
117
+ readonly SourcesLdapLdapsource: "authentik_sources_ldap.ldapsource";
118
+ readonly SourcesLdapLdappropertymapping: "authentik_sources_ldap.ldappropertymapping";
119
+ readonly SourcesOauthOauthsource: "authentik_sources_oauth.oauthsource";
120
+ readonly SourcesOauthUseroauthsourceconnection: "authentik_sources_oauth.useroauthsourceconnection";
121
+ readonly SourcesPlexPlexsource: "authentik_sources_plex.plexsource";
122
+ readonly SourcesPlexPlexsourceconnection: "authentik_sources_plex.plexsourceconnection";
123
+ readonly SourcesSamlSamlsource: "authentik_sources_saml.samlsource";
124
+ readonly SourcesSamlUsersamlsourceconnection: "authentik_sources_saml.usersamlsourceconnection";
125
+ readonly StagesAuthenticatorDuoAuthenticatorduostage: "authentik_stages_authenticator_duo.authenticatorduostage";
126
+ readonly StagesAuthenticatorDuoDuodevice: "authentik_stages_authenticator_duo.duodevice";
127
+ readonly StagesAuthenticatorSmsAuthenticatorsmsstage: "authentik_stages_authenticator_sms.authenticatorsmsstage";
128
+ readonly StagesAuthenticatorSmsSmsdevice: "authentik_stages_authenticator_sms.smsdevice";
129
+ readonly StagesAuthenticatorStaticAuthenticatorstaticstage: "authentik_stages_authenticator_static.authenticatorstaticstage";
130
+ readonly StagesAuthenticatorTotpAuthenticatortotpstage: "authentik_stages_authenticator_totp.authenticatortotpstage";
131
+ readonly StagesAuthenticatorValidateAuthenticatorvalidatestage: "authentik_stages_authenticator_validate.authenticatorvalidatestage";
132
+ readonly StagesAuthenticatorWebauthnAuthenticatewebauthnstage: "authentik_stages_authenticator_webauthn.authenticatewebauthnstage";
133
+ readonly StagesAuthenticatorWebauthnWebauthndevice: "authentik_stages_authenticator_webauthn.webauthndevice";
134
+ readonly StagesCaptchaCaptchastage: "authentik_stages_captcha.captchastage";
135
+ readonly StagesConsentConsentstage: "authentik_stages_consent.consentstage";
136
+ readonly StagesConsentUserconsent: "authentik_stages_consent.userconsent";
137
+ readonly StagesDenyDenystage: "authentik_stages_deny.denystage";
138
+ readonly StagesDummyDummystage: "authentik_stages_dummy.dummystage";
139
+ readonly StagesEmailEmailstage: "authentik_stages_email.emailstage";
140
+ readonly StagesIdentificationIdentificationstage: "authentik_stages_identification.identificationstage";
141
+ readonly StagesInvitationInvitationstage: "authentik_stages_invitation.invitationstage";
142
+ readonly StagesInvitationInvitation: "authentik_stages_invitation.invitation";
143
+ readonly StagesPasswordPasswordstage: "authentik_stages_password.passwordstage";
144
+ readonly StagesPromptPrompt: "authentik_stages_prompt.prompt";
145
+ readonly StagesPromptPromptstage: "authentik_stages_prompt.promptstage";
146
+ readonly StagesUserDeleteUserdeletestage: "authentik_stages_user_delete.userdeletestage";
147
+ readonly StagesUserLoginUserloginstage: "authentik_stages_user_login.userloginstage";
148
+ readonly StagesUserLogoutUserlogoutstage: "authentik_stages_user_logout.userlogoutstage";
149
+ readonly StagesUserWriteUserwritestage: "authentik_stages_user_write.userwritestage";
150
+ readonly TenantsTenant: "authentik_tenants.tenant";
151
+ readonly BlueprintsBlueprintinstance: "authentik_blueprints.blueprintinstance";
152
+ readonly CoreGroup: "authentik_core.group";
153
+ readonly CoreUser: "authentik_core.user";
154
+ readonly CoreApplication: "authentik_core.application";
155
+ readonly CoreToken: "authentik_core.token";
156
+ readonly UnknownDefaultOpenApi: "11184809";
157
+ };
158
+ export type ModelEnum = typeof ModelEnum[keyof typeof ModelEnum];
159
+ export declare function ModelEnumFromJSON(json: any): ModelEnum;
160
+ export declare function ModelEnumFromJSONTyped(json: any, ignoreDiscriminator: boolean): ModelEnum;
161
+ export declare function ModelEnumToJSON(value?: ModelEnum | null): any;