@goauthentik/api 2024.6.3-1723497462 → 2024.6.3-1723921843

Sign up to get free protection for your applications and to get access to all the features.
Files changed (57) hide show
  1. package/.openapi-generator/FILES +1 -0
  2. package/dist/apis/OutpostsApi.d.ts +16 -4
  3. package/dist/apis/OutpostsApi.js +42 -4
  4. package/dist/apis/ProvidersApi.d.ts +3 -2
  5. package/dist/apis/ProvidersApi.js +9 -6
  6. package/dist/esm/apis/OutpostsApi.d.ts +16 -4
  7. package/dist/esm/apis/OutpostsApi.js +43 -5
  8. package/dist/esm/apis/ProvidersApi.d.ts +3 -2
  9. package/dist/esm/apis/ProvidersApi.js +9 -6
  10. package/dist/esm/models/LDAPCheckAccess.d.ts +38 -0
  11. package/dist/esm/models/LDAPCheckAccess.js +47 -0
  12. package/dist/esm/models/LDAPOutpostConfig.d.ts +0 -6
  13. package/dist/esm/models/LDAPOutpostConfig.js +0 -2
  14. package/dist/esm/models/LDAPProvider.d.ts +0 -6
  15. package/dist/esm/models/LDAPProvider.js +0 -2
  16. package/dist/esm/models/LDAPProviderRequest.d.ts +0 -6
  17. package/dist/esm/models/LDAPProviderRequest.js +0 -2
  18. package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +0 -6
  19. package/dist/esm/models/PatchedLDAPProviderRequest.js +0 -2
  20. package/dist/esm/models/PatchedSAMLProviderRequest.d.ts +18 -0
  21. package/dist/esm/models/PatchedSAMLProviderRequest.js +6 -0
  22. package/dist/esm/models/SAMLProvider.d.ts +18 -0
  23. package/dist/esm/models/SAMLProvider.js +6 -0
  24. package/dist/esm/models/SAMLProviderRequest.d.ts +18 -0
  25. package/dist/esm/models/SAMLProviderRequest.js +6 -0
  26. package/dist/esm/models/index.d.ts +1 -0
  27. package/dist/esm/models/index.js +1 -0
  28. package/dist/models/LDAPCheckAccess.d.ts +38 -0
  29. package/dist/models/LDAPCheckAccess.js +54 -0
  30. package/dist/models/LDAPOutpostConfig.d.ts +0 -6
  31. package/dist/models/LDAPOutpostConfig.js +0 -2
  32. package/dist/models/LDAPProvider.d.ts +0 -6
  33. package/dist/models/LDAPProvider.js +0 -2
  34. package/dist/models/LDAPProviderRequest.d.ts +0 -6
  35. package/dist/models/LDAPProviderRequest.js +0 -2
  36. package/dist/models/PatchedLDAPProviderRequest.d.ts +0 -6
  37. package/dist/models/PatchedLDAPProviderRequest.js +0 -2
  38. package/dist/models/PatchedSAMLProviderRequest.d.ts +18 -0
  39. package/dist/models/PatchedSAMLProviderRequest.js +6 -0
  40. package/dist/models/SAMLProvider.d.ts +18 -0
  41. package/dist/models/SAMLProvider.js +6 -0
  42. package/dist/models/SAMLProviderRequest.d.ts +18 -0
  43. package/dist/models/SAMLProviderRequest.js +6 -0
  44. package/dist/models/index.d.ts +1 -0
  45. package/dist/models/index.js +1 -0
  46. package/package.json +1 -1
  47. package/src/apis/OutpostsApi.ts +55 -5
  48. package/src/apis/ProvidersApi.ts +15 -10
  49. package/src/models/LDAPCheckAccess.ts +81 -0
  50. package/src/models/LDAPOutpostConfig.ts +0 -8
  51. package/src/models/LDAPProvider.ts +0 -8
  52. package/src/models/LDAPProviderRequest.ts +0 -8
  53. package/src/models/PatchedLDAPProviderRequest.ts +0 -8
  54. package/src/models/PatchedSAMLProviderRequest.ts +24 -0
  55. package/src/models/SAMLProvider.ts +24 -0
  56. package/src/models/SAMLProviderRequest.ts +24 -0
  57. package/src/models/index.ts +1 -0
@@ -345,8 +345,6 @@ export interface ProvidersLdapListRequest {
345
345
  page?: number;
346
346
  pageSize?: number;
347
347
  search?: string;
348
- searchGroupGroupUuidIexact?: string;
349
- searchGroupNameIexact?: string;
350
348
  tlsServerNameIexact?: string;
351
349
  uidStartNumberIexact?: number;
352
350
  }
@@ -662,6 +660,7 @@ export interface ProvidersSamlListRequest {
662
660
  backchannelApplication?: string;
663
661
  defaultRelayState?: string;
664
662
  digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
663
+ encryptionKp?: string;
665
664
  isBackchannel?: boolean;
666
665
  issuer?: string;
667
666
  name?: string;
@@ -672,6 +671,8 @@ export interface ProvidersSamlListRequest {
672
671
  propertyMappings?: Array<string>;
673
672
  search?: string;
674
673
  sessionValidNotOnOrAfter?: string;
674
+ signAssertion?: boolean;
675
+ signResponse?: boolean;
675
676
  signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
676
677
  signingKp?: string;
677
678
  spBinding?: ProvidersSamlListSpBindingEnum;
@@ -1914,14 +1915,6 @@ export class ProvidersApi extends runtime.BaseAPI {
1914
1915
  queryParameters['search'] = requestParameters.search;
1915
1916
  }
1916
1917
 
1917
- if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
1918
- queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
1919
- }
1920
-
1921
- if (requestParameters.searchGroupNameIexact !== undefined) {
1922
- queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
1923
- }
1924
-
1925
1918
  if (requestParameters.tlsServerNameIexact !== undefined) {
1926
1919
  queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
1927
1920
  }
@@ -4470,6 +4463,10 @@ export class ProvidersApi extends runtime.BaseAPI {
4470
4463
  queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
4471
4464
  }
4472
4465
 
4466
+ if (requestParameters.encryptionKp !== undefined) {
4467
+ queryParameters['encryption_kp'] = requestParameters.encryptionKp;
4468
+ }
4469
+
4473
4470
  if (requestParameters.isBackchannel !== undefined) {
4474
4471
  queryParameters['is_backchannel'] = requestParameters.isBackchannel;
4475
4472
  }
@@ -4510,6 +4507,14 @@ export class ProvidersApi extends runtime.BaseAPI {
4510
4507
  queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
4511
4508
  }
4512
4509
 
4510
+ if (requestParameters.signAssertion !== undefined) {
4511
+ queryParameters['sign_assertion'] = requestParameters.signAssertion;
4512
+ }
4513
+
4514
+ if (requestParameters.signResponse !== undefined) {
4515
+ queryParameters['sign_response'] = requestParameters.signResponse;
4516
+ }
4517
+
4513
4518
  if (requestParameters.signatureAlgorithm !== undefined) {
4514
4519
  queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
4515
4520
  }
@@ -0,0 +1,81 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2024.6.3
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+
15
+ import { exists, mapValues } from '../runtime';
16
+ import type { PolicyTestResult } from './PolicyTestResult';
17
+ import {
18
+ PolicyTestResultFromJSON,
19
+ PolicyTestResultFromJSONTyped,
20
+ PolicyTestResultToJSON,
21
+ } from './PolicyTestResult';
22
+
23
+ /**
24
+ * Base serializer class which doesn't implement create/update methods
25
+ * @export
26
+ * @interface LDAPCheckAccess
27
+ */
28
+ export interface LDAPCheckAccess {
29
+ /**
30
+ *
31
+ * @type {boolean}
32
+ * @memberof LDAPCheckAccess
33
+ */
34
+ hasSearchPermission?: boolean;
35
+ /**
36
+ *
37
+ * @type {PolicyTestResult}
38
+ * @memberof LDAPCheckAccess
39
+ */
40
+ access: PolicyTestResult;
41
+ }
42
+
43
+ /**
44
+ * Check if a given object implements the LDAPCheckAccess interface.
45
+ */
46
+ export function instanceOfLDAPCheckAccess(value: object): boolean {
47
+ let isInstance = true;
48
+ isInstance = isInstance && "access" in value;
49
+
50
+ return isInstance;
51
+ }
52
+
53
+ export function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess {
54
+ return LDAPCheckAccessFromJSONTyped(json, false);
55
+ }
56
+
57
+ export function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess {
58
+ if ((json === undefined) || (json === null)) {
59
+ return json;
60
+ }
61
+ return {
62
+
63
+ 'hasSearchPermission': !exists(json, 'has_search_permission') ? undefined : json['has_search_permission'],
64
+ 'access': PolicyTestResultFromJSON(json['access']),
65
+ };
66
+ }
67
+
68
+ export function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any {
69
+ if (value === undefined) {
70
+ return undefined;
71
+ }
72
+ if (value === null) {
73
+ return null;
74
+ }
75
+ return {
76
+
77
+ 'has_search_permission': value.hasSearchPermission,
78
+ 'access': PolicyTestResultToJSON(value.access),
79
+ };
80
+ }
81
+
@@ -56,12 +56,6 @@ export interface LDAPOutpostConfig {
56
56
  * @memberof LDAPOutpostConfig
57
57
  */
58
58
  readonly applicationSlug: string;
59
- /**
60
- * Users in this group can do search queries. If not set, every user can execute search queries.
61
- * @type {string}
62
- * @memberof LDAPOutpostConfig
63
- */
64
- searchGroup?: string | null;
65
59
  /**
66
60
  *
67
61
  * @type {string}
@@ -134,7 +128,6 @@ export function LDAPOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator: b
134
128
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
135
129
  'bindFlowSlug': json['bind_flow_slug'],
136
130
  'applicationSlug': json['application_slug'],
137
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
138
131
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
139
132
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
140
133
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -157,7 +150,6 @@ export function LDAPOutpostConfigToJSON(value?: LDAPOutpostConfig | null): any {
157
150
  'name': value.name,
158
151
  'base_dn': value.baseDn,
159
152
  'bind_flow_slug': value.bindFlowSlug,
160
- 'search_group': value.searchGroup,
161
153
  'certificate': value.certificate,
162
154
  'tls_server_name': value.tlsServerName,
163
155
  'uid_start_number': value.uidStartNumber,
@@ -110,12 +110,6 @@ export interface LDAPProvider {
110
110
  * @memberof LDAPProvider
111
111
  */
112
112
  baseDn?: string;
113
- /**
114
- * Users in this group can do search queries. If not set, every user can execute search queries.
115
- * @type {string}
116
- * @memberof LDAPProvider
117
- */
118
- searchGroup?: string | null;
119
113
  /**
120
114
  *
121
115
  * @type {string}
@@ -211,7 +205,6 @@ export function LDAPProviderFromJSONTyped(json: any, ignoreDiscriminator: boolea
211
205
  'verboseNamePlural': json['verbose_name_plural'],
212
206
  'metaModelName': json['meta_model_name'],
213
207
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
214
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
215
208
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
216
209
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
217
210
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -237,7 +230,6 @@ export function LDAPProviderToJSON(value?: LDAPProvider | null): any {
237
230
  'authorization_flow': value.authorizationFlow,
238
231
  'property_mappings': value.propertyMappings,
239
232
  'base_dn': value.baseDn,
240
- 'search_group': value.searchGroup,
241
233
  'certificate': value.certificate,
242
234
  'tls_server_name': value.tlsServerName,
243
235
  'uid_start_number': value.uidStartNumber,
@@ -56,12 +56,6 @@ export interface LDAPProviderRequest {
56
56
  * @memberof LDAPProviderRequest
57
57
  */
58
58
  baseDn?: string;
59
- /**
60
- * Users in this group can do search queries. If not set, every user can execute search queries.
61
- * @type {string}
62
- * @memberof LDAPProviderRequest
63
- */
64
- searchGroup?: string | null;
65
59
  /**
66
60
  *
67
61
  * @type {string}
@@ -132,7 +126,6 @@ export function LDAPProviderRequestFromJSONTyped(json: any, ignoreDiscriminator:
132
126
  'authorizationFlow': json['authorization_flow'],
133
127
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
134
128
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
135
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
136
129
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
137
130
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
138
131
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -157,7 +150,6 @@ export function LDAPProviderRequestToJSON(value?: LDAPProviderRequest | null): a
157
150
  'authorization_flow': value.authorizationFlow,
158
151
  'property_mappings': value.propertyMappings,
159
152
  'base_dn': value.baseDn,
160
- 'search_group': value.searchGroup,
161
153
  'certificate': value.certificate,
162
154
  'tls_server_name': value.tlsServerName,
163
155
  'uid_start_number': value.uidStartNumber,
@@ -56,12 +56,6 @@ export interface PatchedLDAPProviderRequest {
56
56
  * @memberof PatchedLDAPProviderRequest
57
57
  */
58
58
  baseDn?: string;
59
- /**
60
- * Users in this group can do search queries. If not set, every user can execute search queries.
61
- * @type {string}
62
- * @memberof PatchedLDAPProviderRequest
63
- */
64
- searchGroup?: string | null;
65
59
  /**
66
60
  *
67
61
  * @type {string}
@@ -130,7 +124,6 @@ export function PatchedLDAPProviderRequestFromJSONTyped(json: any, ignoreDiscrim
130
124
  'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
131
125
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
132
126
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
133
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
134
127
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
135
128
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
136
129
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -155,7 +148,6 @@ export function PatchedLDAPProviderRequestToJSON(value?: PatchedLDAPProviderRequ
155
148
  'authorization_flow': value.authorizationFlow,
156
149
  'property_mappings': value.propertyMappings,
157
150
  'base_dn': value.baseDn,
158
- 'search_group': value.searchGroup,
159
151
  'certificate': value.certificate,
160
152
  'tls_server_name': value.tlsServerName,
161
153
  'uid_start_number': value.uidStartNumber,
@@ -128,6 +128,24 @@ export interface PatchedSAMLProviderRequest {
128
128
  * @memberof PatchedSAMLProviderRequest
129
129
  */
130
130
  verificationKp?: string | null;
131
+ /**
132
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
133
+ * @type {string}
134
+ * @memberof PatchedSAMLProviderRequest
135
+ */
136
+ encryptionKp?: string | null;
137
+ /**
138
+ *
139
+ * @type {boolean}
140
+ * @memberof PatchedSAMLProviderRequest
141
+ */
142
+ signAssertion?: boolean;
143
+ /**
144
+ *
145
+ * @type {boolean}
146
+ * @memberof PatchedSAMLProviderRequest
147
+ */
148
+ signResponse?: boolean;
131
149
  /**
132
150
  *
133
151
  * @type {SpBindingEnum}
@@ -176,6 +194,9 @@ export function PatchedSAMLProviderRequestFromJSONTyped(json: any, ignoreDiscrim
176
194
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
177
195
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
178
196
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
197
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
198
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
199
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
179
200
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
180
201
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
181
202
  };
@@ -205,6 +226,9 @@ export function PatchedSAMLProviderRequestToJSON(value?: PatchedSAMLProviderRequ
205
226
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
206
227
  'signing_kp': value.signingKp,
207
228
  'verification_kp': value.verificationKp,
229
+ 'encryption_kp': value.encryptionKp,
230
+ 'sign_assertion': value.signAssertion,
231
+ 'sign_response': value.signResponse,
208
232
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
209
233
  'default_relay_state': value.defaultRelayState,
210
234
  };
@@ -182,6 +182,24 @@ export interface SAMLProvider {
182
182
  * @memberof SAMLProvider
183
183
  */
184
184
  verificationKp?: string | null;
185
+ /**
186
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
187
+ * @type {string}
188
+ * @memberof SAMLProvider
189
+ */
190
+ encryptionKp?: string | null;
191
+ /**
192
+ *
193
+ * @type {boolean}
194
+ * @memberof SAMLProvider
195
+ */
196
+ signAssertion?: boolean;
197
+ /**
198
+ *
199
+ * @type {boolean}
200
+ * @memberof SAMLProvider
201
+ */
202
+ signResponse?: boolean;
185
203
  /**
186
204
  *
187
205
  * @type {SpBindingEnum}
@@ -293,6 +311,9 @@ export function SAMLProviderFromJSONTyped(json: any, ignoreDiscriminator: boolea
293
311
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
294
312
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
295
313
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
314
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
315
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
316
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
296
317
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
297
318
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
298
319
  'urlDownloadMetadata': json['url_download_metadata'],
@@ -328,6 +349,9 @@ export function SAMLProviderToJSON(value?: SAMLProvider | null): any {
328
349
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
329
350
  'signing_kp': value.signingKp,
330
351
  'verification_kp': value.verificationKp,
352
+ 'encryption_kp': value.encryptionKp,
353
+ 'sign_assertion': value.signAssertion,
354
+ 'sign_response': value.signResponse,
331
355
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
332
356
  'default_relay_state': value.defaultRelayState,
333
357
  };
@@ -128,6 +128,24 @@ export interface SAMLProviderRequest {
128
128
  * @memberof SAMLProviderRequest
129
129
  */
130
130
  verificationKp?: string | null;
131
+ /**
132
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
133
+ * @type {string}
134
+ * @memberof SAMLProviderRequest
135
+ */
136
+ encryptionKp?: string | null;
137
+ /**
138
+ *
139
+ * @type {boolean}
140
+ * @memberof SAMLProviderRequest
141
+ */
142
+ signAssertion?: boolean;
143
+ /**
144
+ *
145
+ * @type {boolean}
146
+ * @memberof SAMLProviderRequest
147
+ */
148
+ signResponse?: boolean;
131
149
  /**
132
150
  *
133
151
  * @type {SpBindingEnum}
@@ -179,6 +197,9 @@ export function SAMLProviderRequestFromJSONTyped(json: any, ignoreDiscriminator:
179
197
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
180
198
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
181
199
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
200
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
201
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
202
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
182
203
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
183
204
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
184
205
  };
@@ -208,6 +229,9 @@ export function SAMLProviderRequestToJSON(value?: SAMLProviderRequest | null): a
208
229
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
209
230
  'signing_kp': value.signingKp,
210
231
  'verification_kp': value.verificationKp,
232
+ 'encryption_kp': value.encryptionKp,
233
+ 'sign_assertion': value.signAssertion,
234
+ 'sign_response': value.signResponse,
211
235
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
212
236
  'default_relay_state': value.defaultRelayState,
213
237
  };
@@ -179,6 +179,7 @@ export * from './IssuerModeEnum';
179
179
  export * from './KubernetesServiceConnection';
180
180
  export * from './KubernetesServiceConnectionRequest';
181
181
  export * from './LDAPAPIAccessMode';
182
+ export * from './LDAPCheckAccess';
182
183
  export * from './LDAPDebug';
183
184
  export * from './LDAPOutpostConfig';
184
185
  export * from './LDAPProvider';