@goauthentik/api 2023.8.3-1697642041 → 2023.8.3-1697813667
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/esm/models/PatchedRadiusProviderRequest.d.ts +6 -0
- package/dist/esm/models/PatchedRadiusProviderRequest.js +2 -0
- package/dist/esm/models/RadiusOutpostConfig.d.ts +6 -0
- package/dist/esm/models/RadiusOutpostConfig.js +2 -0
- package/dist/esm/models/RadiusProvider.d.ts +6 -0
- package/dist/esm/models/RadiusProvider.js +2 -0
- package/dist/esm/models/RadiusProviderRequest.d.ts +6 -0
- package/dist/esm/models/RadiusProviderRequest.js +2 -0
- package/dist/esm/models/SourceType.d.ts +12 -0
- package/dist/esm/models/SourceType.js +4 -0
- package/dist/models/PatchedRadiusProviderRequest.d.ts +6 -0
- package/dist/models/PatchedRadiusProviderRequest.js +2 -0
- package/dist/models/RadiusOutpostConfig.d.ts +6 -0
- package/dist/models/RadiusOutpostConfig.js +2 -0
- package/dist/models/RadiusProvider.d.ts +6 -0
- package/dist/models/RadiusProvider.js +2 -0
- package/dist/models/RadiusProviderRequest.d.ts +6 -0
- package/dist/models/RadiusProviderRequest.js +2 -0
- package/dist/models/SourceType.d.ts +12 -0
- package/dist/models/SourceType.js +4 -0
- package/package.json +1 -1
- package/src/models/PatchedRadiusProviderRequest.ts +8 -0
- package/src/models/RadiusOutpostConfig.ts +8 -0
- package/src/models/RadiusProvider.ts +8 -0
- package/src/models/RadiusProviderRequest.ts +8 -0
- package/src/models/SourceType.ts +16 -0
|
@@ -51,6 +51,12 @@ export interface PatchedRadiusProviderRequest {
|
|
|
51
51
|
* @memberof PatchedRadiusProviderRequest
|
|
52
52
|
*/
|
|
53
53
|
sharedSecret?: string;
|
|
54
|
+
/**
|
|
55
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
56
|
+
* @type {boolean}
|
|
57
|
+
* @memberof PatchedRadiusProviderRequest
|
|
58
|
+
*/
|
|
59
|
+
mfaSupport?: boolean;
|
|
54
60
|
}
|
|
55
61
|
/**
|
|
56
62
|
* Check if a given object implements the PatchedRadiusProviderRequest interface.
|
|
@@ -33,6 +33,7 @@ export function PatchedRadiusProviderRequestFromJSONTyped(json, ignoreDiscrimina
|
|
|
33
33
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
34
34
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
35
35
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
36
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
36
37
|
};
|
|
37
38
|
}
|
|
38
39
|
export function PatchedRadiusProviderRequestToJSON(value) {
|
|
@@ -49,5 +50,6 @@ export function PatchedRadiusProviderRequestToJSON(value) {
|
|
|
49
50
|
'property_mappings': value.propertyMappings,
|
|
50
51
|
'client_networks': value.clientNetworks,
|
|
51
52
|
'shared_secret': value.sharedSecret,
|
|
53
|
+
'mfa_support': value.mfaSupport,
|
|
52
54
|
};
|
|
53
55
|
}
|
|
@@ -51,6 +51,12 @@ export interface RadiusOutpostConfig {
|
|
|
51
51
|
* @memberof RadiusOutpostConfig
|
|
52
52
|
*/
|
|
53
53
|
sharedSecret?: string;
|
|
54
|
+
/**
|
|
55
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
56
|
+
* @type {boolean}
|
|
57
|
+
* @memberof RadiusOutpostConfig
|
|
58
|
+
*/
|
|
59
|
+
mfaSupport?: boolean;
|
|
54
60
|
}
|
|
55
61
|
/**
|
|
56
62
|
* Check if a given object implements the RadiusOutpostConfig interface.
|
|
@@ -37,6 +37,7 @@ export function RadiusOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
37
37
|
'authFlowSlug': json['auth_flow_slug'],
|
|
38
38
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
39
39
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
40
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
40
41
|
};
|
|
41
42
|
}
|
|
42
43
|
export function RadiusOutpostConfigToJSON(value) {
|
|
@@ -52,5 +53,6 @@ export function RadiusOutpostConfigToJSON(value) {
|
|
|
52
53
|
'auth_flow_slug': value.authFlowSlug,
|
|
53
54
|
'client_networks': value.clientNetworks,
|
|
54
55
|
'shared_secret': value.sharedSecret,
|
|
56
|
+
'mfa_support': value.mfaSupport,
|
|
55
57
|
};
|
|
56
58
|
}
|
|
@@ -111,6 +111,12 @@ export interface RadiusProvider {
|
|
|
111
111
|
* @memberof RadiusProvider
|
|
112
112
|
*/
|
|
113
113
|
readonly outpostSet: Array<string>;
|
|
114
|
+
/**
|
|
115
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
116
|
+
* @type {boolean}
|
|
117
|
+
* @memberof RadiusProvider
|
|
118
|
+
*/
|
|
119
|
+
mfaSupport?: boolean;
|
|
114
120
|
}
|
|
115
121
|
/**
|
|
116
122
|
* Check if a given object implements the RadiusProvider interface.
|
|
@@ -55,6 +55,7 @@ export function RadiusProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
55
55
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
56
56
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
57
57
|
'outpostSet': json['outpost_set'],
|
|
58
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
58
59
|
};
|
|
59
60
|
}
|
|
60
61
|
export function RadiusProviderToJSON(value) {
|
|
@@ -71,5 +72,6 @@ export function RadiusProviderToJSON(value) {
|
|
|
71
72
|
'property_mappings': value.propertyMappings,
|
|
72
73
|
'client_networks': value.clientNetworks,
|
|
73
74
|
'shared_secret': value.sharedSecret,
|
|
75
|
+
'mfa_support': value.mfaSupport,
|
|
74
76
|
};
|
|
75
77
|
}
|
|
@@ -51,6 +51,12 @@ export interface RadiusProviderRequest {
|
|
|
51
51
|
* @memberof RadiusProviderRequest
|
|
52
52
|
*/
|
|
53
53
|
sharedSecret?: string;
|
|
54
|
+
/**
|
|
55
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
56
|
+
* @type {boolean}
|
|
57
|
+
* @memberof RadiusProviderRequest
|
|
58
|
+
*/
|
|
59
|
+
mfaSupport?: boolean;
|
|
54
60
|
}
|
|
55
61
|
/**
|
|
56
62
|
* Check if a given object implements the RadiusProviderRequest interface.
|
|
@@ -35,6 +35,7 @@ export function RadiusProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
35
35
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
36
36
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
37
37
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
38
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
38
39
|
};
|
|
39
40
|
}
|
|
40
41
|
export function RadiusProviderRequestToJSON(value) {
|
|
@@ -51,5 +52,6 @@ export function RadiusProviderRequestToJSON(value) {
|
|
|
51
52
|
'property_mappings': value.propertyMappings,
|
|
52
53
|
'client_networks': value.clientNetworks,
|
|
53
54
|
'shared_secret': value.sharedSecret,
|
|
55
|
+
'mfa_support': value.mfaSupport,
|
|
54
56
|
};
|
|
55
57
|
}
|
|
@@ -57,6 +57,18 @@ export interface SourceType {
|
|
|
57
57
|
* @memberof SourceType
|
|
58
58
|
*/
|
|
59
59
|
readonly profileUrl: string | null;
|
|
60
|
+
/**
|
|
61
|
+
*
|
|
62
|
+
* @type {string}
|
|
63
|
+
* @memberof SourceType
|
|
64
|
+
*/
|
|
65
|
+
readonly oidcWellKnownUrl: string | null;
|
|
66
|
+
/**
|
|
67
|
+
*
|
|
68
|
+
* @type {string}
|
|
69
|
+
* @memberof SourceType
|
|
70
|
+
*/
|
|
71
|
+
readonly oidcJwksUrl: string | null;
|
|
60
72
|
}
|
|
61
73
|
/**
|
|
62
74
|
* Check if a given object implements the SourceType interface.
|
|
@@ -23,6 +23,8 @@ export function instanceOfSourceType(value) {
|
|
|
23
23
|
isInstance = isInstance && "authorizationUrl" in value;
|
|
24
24
|
isInstance = isInstance && "accessTokenUrl" in value;
|
|
25
25
|
isInstance = isInstance && "profileUrl" in value;
|
|
26
|
+
isInstance = isInstance && "oidcWellKnownUrl" in value;
|
|
27
|
+
isInstance = isInstance && "oidcJwksUrl" in value;
|
|
26
28
|
return isInstance;
|
|
27
29
|
}
|
|
28
30
|
export function SourceTypeFromJSON(json) {
|
|
@@ -40,6 +42,8 @@ export function SourceTypeFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
40
42
|
'authorizationUrl': json['authorization_url'],
|
|
41
43
|
'accessTokenUrl': json['access_token_url'],
|
|
42
44
|
'profileUrl': json['profile_url'],
|
|
45
|
+
'oidcWellKnownUrl': json['oidc_well_known_url'],
|
|
46
|
+
'oidcJwksUrl': json['oidc_jwks_url'],
|
|
43
47
|
};
|
|
44
48
|
}
|
|
45
49
|
export function SourceTypeToJSON(value) {
|
|
@@ -51,6 +51,12 @@ export interface PatchedRadiusProviderRequest {
|
|
|
51
51
|
* @memberof PatchedRadiusProviderRequest
|
|
52
52
|
*/
|
|
53
53
|
sharedSecret?: string;
|
|
54
|
+
/**
|
|
55
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
56
|
+
* @type {boolean}
|
|
57
|
+
* @memberof PatchedRadiusProviderRequest
|
|
58
|
+
*/
|
|
59
|
+
mfaSupport?: boolean;
|
|
54
60
|
}
|
|
55
61
|
/**
|
|
56
62
|
* Check if a given object implements the PatchedRadiusProviderRequest interface.
|
|
@@ -38,6 +38,7 @@ function PatchedRadiusProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
38
38
|
'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
39
39
|
'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
|
|
40
40
|
'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
41
|
+
'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
41
42
|
};
|
|
42
43
|
}
|
|
43
44
|
exports.PatchedRadiusProviderRequestFromJSONTyped = PatchedRadiusProviderRequestFromJSONTyped;
|
|
@@ -55,6 +56,7 @@ function PatchedRadiusProviderRequestToJSON(value) {
|
|
|
55
56
|
'property_mappings': value.propertyMappings,
|
|
56
57
|
'client_networks': value.clientNetworks,
|
|
57
58
|
'shared_secret': value.sharedSecret,
|
|
59
|
+
'mfa_support': value.mfaSupport,
|
|
58
60
|
};
|
|
59
61
|
}
|
|
60
62
|
exports.PatchedRadiusProviderRequestToJSON = PatchedRadiusProviderRequestToJSON;
|
|
@@ -51,6 +51,12 @@ export interface RadiusOutpostConfig {
|
|
|
51
51
|
* @memberof RadiusOutpostConfig
|
|
52
52
|
*/
|
|
53
53
|
sharedSecret?: string;
|
|
54
|
+
/**
|
|
55
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
56
|
+
* @type {boolean}
|
|
57
|
+
* @memberof RadiusOutpostConfig
|
|
58
|
+
*/
|
|
59
|
+
mfaSupport?: boolean;
|
|
54
60
|
}
|
|
55
61
|
/**
|
|
56
62
|
* Check if a given object implements the RadiusOutpostConfig interface.
|
|
@@ -42,6 +42,7 @@ function RadiusOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
42
42
|
'authFlowSlug': json['auth_flow_slug'],
|
|
43
43
|
'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
|
|
44
44
|
'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
45
|
+
'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
45
46
|
};
|
|
46
47
|
}
|
|
47
48
|
exports.RadiusOutpostConfigFromJSONTyped = RadiusOutpostConfigFromJSONTyped;
|
|
@@ -58,6 +59,7 @@ function RadiusOutpostConfigToJSON(value) {
|
|
|
58
59
|
'auth_flow_slug': value.authFlowSlug,
|
|
59
60
|
'client_networks': value.clientNetworks,
|
|
60
61
|
'shared_secret': value.sharedSecret,
|
|
62
|
+
'mfa_support': value.mfaSupport,
|
|
61
63
|
};
|
|
62
64
|
}
|
|
63
65
|
exports.RadiusOutpostConfigToJSON = RadiusOutpostConfigToJSON;
|
|
@@ -111,6 +111,12 @@ export interface RadiusProvider {
|
|
|
111
111
|
* @memberof RadiusProvider
|
|
112
112
|
*/
|
|
113
113
|
readonly outpostSet: Array<string>;
|
|
114
|
+
/**
|
|
115
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
116
|
+
* @type {boolean}
|
|
117
|
+
* @memberof RadiusProvider
|
|
118
|
+
*/
|
|
119
|
+
mfaSupport?: boolean;
|
|
114
120
|
}
|
|
115
121
|
/**
|
|
116
122
|
* Check if a given object implements the RadiusProvider interface.
|
|
@@ -60,6 +60,7 @@ function RadiusProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
60
60
|
'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
|
|
61
61
|
'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
62
62
|
'outpostSet': json['outpost_set'],
|
|
63
|
+
'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
63
64
|
};
|
|
64
65
|
}
|
|
65
66
|
exports.RadiusProviderFromJSONTyped = RadiusProviderFromJSONTyped;
|
|
@@ -77,6 +78,7 @@ function RadiusProviderToJSON(value) {
|
|
|
77
78
|
'property_mappings': value.propertyMappings,
|
|
78
79
|
'client_networks': value.clientNetworks,
|
|
79
80
|
'shared_secret': value.sharedSecret,
|
|
81
|
+
'mfa_support': value.mfaSupport,
|
|
80
82
|
};
|
|
81
83
|
}
|
|
82
84
|
exports.RadiusProviderToJSON = RadiusProviderToJSON;
|
|
@@ -51,6 +51,12 @@ export interface RadiusProviderRequest {
|
|
|
51
51
|
* @memberof RadiusProviderRequest
|
|
52
52
|
*/
|
|
53
53
|
sharedSecret?: string;
|
|
54
|
+
/**
|
|
55
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
56
|
+
* @type {boolean}
|
|
57
|
+
* @memberof RadiusProviderRequest
|
|
58
|
+
*/
|
|
59
|
+
mfaSupport?: boolean;
|
|
54
60
|
}
|
|
55
61
|
/**
|
|
56
62
|
* Check if a given object implements the RadiusProviderRequest interface.
|
|
@@ -40,6 +40,7 @@ function RadiusProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
40
40
|
'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
41
41
|
'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
|
|
42
42
|
'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
43
|
+
'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
43
44
|
};
|
|
44
45
|
}
|
|
45
46
|
exports.RadiusProviderRequestFromJSONTyped = RadiusProviderRequestFromJSONTyped;
|
|
@@ -57,6 +58,7 @@ function RadiusProviderRequestToJSON(value) {
|
|
|
57
58
|
'property_mappings': value.propertyMappings,
|
|
58
59
|
'client_networks': value.clientNetworks,
|
|
59
60
|
'shared_secret': value.sharedSecret,
|
|
61
|
+
'mfa_support': value.mfaSupport,
|
|
60
62
|
};
|
|
61
63
|
}
|
|
62
64
|
exports.RadiusProviderRequestToJSON = RadiusProviderRequestToJSON;
|
|
@@ -57,6 +57,18 @@ export interface SourceType {
|
|
|
57
57
|
* @memberof SourceType
|
|
58
58
|
*/
|
|
59
59
|
readonly profileUrl: string | null;
|
|
60
|
+
/**
|
|
61
|
+
*
|
|
62
|
+
* @type {string}
|
|
63
|
+
* @memberof SourceType
|
|
64
|
+
*/
|
|
65
|
+
readonly oidcWellKnownUrl: string | null;
|
|
66
|
+
/**
|
|
67
|
+
*
|
|
68
|
+
* @type {string}
|
|
69
|
+
* @memberof SourceType
|
|
70
|
+
*/
|
|
71
|
+
readonly oidcJwksUrl: string | null;
|
|
60
72
|
}
|
|
61
73
|
/**
|
|
62
74
|
* Check if a given object implements the SourceType interface.
|
|
@@ -26,6 +26,8 @@ function instanceOfSourceType(value) {
|
|
|
26
26
|
isInstance = isInstance && "authorizationUrl" in value;
|
|
27
27
|
isInstance = isInstance && "accessTokenUrl" in value;
|
|
28
28
|
isInstance = isInstance && "profileUrl" in value;
|
|
29
|
+
isInstance = isInstance && "oidcWellKnownUrl" in value;
|
|
30
|
+
isInstance = isInstance && "oidcJwksUrl" in value;
|
|
29
31
|
return isInstance;
|
|
30
32
|
}
|
|
31
33
|
exports.instanceOfSourceType = instanceOfSourceType;
|
|
@@ -45,6 +47,8 @@ function SourceTypeFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
45
47
|
'authorizationUrl': json['authorization_url'],
|
|
46
48
|
'accessTokenUrl': json['access_token_url'],
|
|
47
49
|
'profileUrl': json['profile_url'],
|
|
50
|
+
'oidcWellKnownUrl': json['oidc_well_known_url'],
|
|
51
|
+
'oidcJwksUrl': json['oidc_jwks_url'],
|
|
48
52
|
};
|
|
49
53
|
}
|
|
50
54
|
exports.SourceTypeFromJSONTyped = SourceTypeFromJSONTyped;
|
package/package.json
CHANGED
|
@@ -55,6 +55,12 @@ export interface PatchedRadiusProviderRequest {
|
|
|
55
55
|
* @memberof PatchedRadiusProviderRequest
|
|
56
56
|
*/
|
|
57
57
|
sharedSecret?: string;
|
|
58
|
+
/**
|
|
59
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
60
|
+
* @type {boolean}
|
|
61
|
+
* @memberof PatchedRadiusProviderRequest
|
|
62
|
+
*/
|
|
63
|
+
mfaSupport?: boolean;
|
|
58
64
|
}
|
|
59
65
|
|
|
60
66
|
/**
|
|
@@ -82,6 +88,7 @@ export function PatchedRadiusProviderRequestFromJSONTyped(json: any, ignoreDiscr
|
|
|
82
88
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
83
89
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
84
90
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
91
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
85
92
|
};
|
|
86
93
|
}
|
|
87
94
|
|
|
@@ -100,6 +107,7 @@ export function PatchedRadiusProviderRequestToJSON(value?: PatchedRadiusProvider
|
|
|
100
107
|
'property_mappings': value.propertyMappings,
|
|
101
108
|
'client_networks': value.clientNetworks,
|
|
102
109
|
'shared_secret': value.sharedSecret,
|
|
110
|
+
'mfa_support': value.mfaSupport,
|
|
103
111
|
};
|
|
104
112
|
}
|
|
105
113
|
|
|
@@ -55,6 +55,12 @@ export interface RadiusOutpostConfig {
|
|
|
55
55
|
* @memberof RadiusOutpostConfig
|
|
56
56
|
*/
|
|
57
57
|
sharedSecret?: string;
|
|
58
|
+
/**
|
|
59
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
60
|
+
* @type {boolean}
|
|
61
|
+
* @memberof RadiusOutpostConfig
|
|
62
|
+
*/
|
|
63
|
+
mfaSupport?: boolean;
|
|
58
64
|
}
|
|
59
65
|
|
|
60
66
|
/**
|
|
@@ -86,6 +92,7 @@ export function RadiusOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator:
|
|
|
86
92
|
'authFlowSlug': json['auth_flow_slug'],
|
|
87
93
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
88
94
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
95
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
89
96
|
};
|
|
90
97
|
}
|
|
91
98
|
|
|
@@ -103,6 +110,7 @@ export function RadiusOutpostConfigToJSON(value?: RadiusOutpostConfig | null): a
|
|
|
103
110
|
'auth_flow_slug': value.authFlowSlug,
|
|
104
111
|
'client_networks': value.clientNetworks,
|
|
105
112
|
'shared_secret': value.sharedSecret,
|
|
113
|
+
'mfa_support': value.mfaSupport,
|
|
106
114
|
};
|
|
107
115
|
}
|
|
108
116
|
|
|
@@ -115,6 +115,12 @@ export interface RadiusProvider {
|
|
|
115
115
|
* @memberof RadiusProvider
|
|
116
116
|
*/
|
|
117
117
|
readonly outpostSet: Array<string>;
|
|
118
|
+
/**
|
|
119
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
120
|
+
* @type {boolean}
|
|
121
|
+
* @memberof RadiusProvider
|
|
122
|
+
*/
|
|
123
|
+
mfaSupport?: boolean;
|
|
118
124
|
}
|
|
119
125
|
|
|
120
126
|
/**
|
|
@@ -164,6 +170,7 @@ export function RadiusProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
|
|
|
164
170
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
165
171
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
166
172
|
'outpostSet': json['outpost_set'],
|
|
173
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
167
174
|
};
|
|
168
175
|
}
|
|
169
176
|
|
|
@@ -182,6 +189,7 @@ export function RadiusProviderToJSON(value?: RadiusProvider | null): any {
|
|
|
182
189
|
'property_mappings': value.propertyMappings,
|
|
183
190
|
'client_networks': value.clientNetworks,
|
|
184
191
|
'shared_secret': value.sharedSecret,
|
|
192
|
+
'mfa_support': value.mfaSupport,
|
|
185
193
|
};
|
|
186
194
|
}
|
|
187
195
|
|
|
@@ -55,6 +55,12 @@ export interface RadiusProviderRequest {
|
|
|
55
55
|
* @memberof RadiusProviderRequest
|
|
56
56
|
*/
|
|
57
57
|
sharedSecret?: string;
|
|
58
|
+
/**
|
|
59
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
60
|
+
* @type {boolean}
|
|
61
|
+
* @memberof RadiusProviderRequest
|
|
62
|
+
*/
|
|
63
|
+
mfaSupport?: boolean;
|
|
58
64
|
}
|
|
59
65
|
|
|
60
66
|
/**
|
|
@@ -84,6 +90,7 @@ export function RadiusProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
|
|
|
84
90
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
85
91
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
86
92
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
93
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
87
94
|
};
|
|
88
95
|
}
|
|
89
96
|
|
|
@@ -102,6 +109,7 @@ export function RadiusProviderRequestToJSON(value?: RadiusProviderRequest | null
|
|
|
102
109
|
'property_mappings': value.propertyMappings,
|
|
103
110
|
'client_networks': value.clientNetworks,
|
|
104
111
|
'shared_secret': value.sharedSecret,
|
|
112
|
+
'mfa_support': value.mfaSupport,
|
|
105
113
|
};
|
|
106
114
|
}
|
|
107
115
|
|
package/src/models/SourceType.ts
CHANGED
|
@@ -61,6 +61,18 @@ export interface SourceType {
|
|
|
61
61
|
* @memberof SourceType
|
|
62
62
|
*/
|
|
63
63
|
readonly profileUrl: string | null;
|
|
64
|
+
/**
|
|
65
|
+
*
|
|
66
|
+
* @type {string}
|
|
67
|
+
* @memberof SourceType
|
|
68
|
+
*/
|
|
69
|
+
readonly oidcWellKnownUrl: string | null;
|
|
70
|
+
/**
|
|
71
|
+
*
|
|
72
|
+
* @type {string}
|
|
73
|
+
* @memberof SourceType
|
|
74
|
+
*/
|
|
75
|
+
readonly oidcJwksUrl: string | null;
|
|
64
76
|
}
|
|
65
77
|
|
|
66
78
|
/**
|
|
@@ -75,6 +87,8 @@ export function instanceOfSourceType(value: object): boolean {
|
|
|
75
87
|
isInstance = isInstance && "authorizationUrl" in value;
|
|
76
88
|
isInstance = isInstance && "accessTokenUrl" in value;
|
|
77
89
|
isInstance = isInstance && "profileUrl" in value;
|
|
90
|
+
isInstance = isInstance && "oidcWellKnownUrl" in value;
|
|
91
|
+
isInstance = isInstance && "oidcJwksUrl" in value;
|
|
78
92
|
|
|
79
93
|
return isInstance;
|
|
80
94
|
}
|
|
@@ -96,6 +110,8 @@ export function SourceTypeFromJSONTyped(json: any, ignoreDiscriminator: boolean)
|
|
|
96
110
|
'authorizationUrl': json['authorization_url'],
|
|
97
111
|
'accessTokenUrl': json['access_token_url'],
|
|
98
112
|
'profileUrl': json['profile_url'],
|
|
113
|
+
'oidcWellKnownUrl': json['oidc_well_known_url'],
|
|
114
|
+
'oidcJwksUrl': json['oidc_jwks_url'],
|
|
99
115
|
};
|
|
100
116
|
}
|
|
101
117
|
|