@goauthentik/api 2024.6.3-1723497462 → 2024.6.3-1723921843

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (57) hide show
  1. package/.openapi-generator/FILES +1 -0
  2. package/dist/apis/OutpostsApi.d.ts +16 -4
  3. package/dist/apis/OutpostsApi.js +42 -4
  4. package/dist/apis/ProvidersApi.d.ts +3 -2
  5. package/dist/apis/ProvidersApi.js +9 -6
  6. package/dist/esm/apis/OutpostsApi.d.ts +16 -4
  7. package/dist/esm/apis/OutpostsApi.js +43 -5
  8. package/dist/esm/apis/ProvidersApi.d.ts +3 -2
  9. package/dist/esm/apis/ProvidersApi.js +9 -6
  10. package/dist/esm/models/LDAPCheckAccess.d.ts +38 -0
  11. package/dist/esm/models/LDAPCheckAccess.js +47 -0
  12. package/dist/esm/models/LDAPOutpostConfig.d.ts +0 -6
  13. package/dist/esm/models/LDAPOutpostConfig.js +0 -2
  14. package/dist/esm/models/LDAPProvider.d.ts +0 -6
  15. package/dist/esm/models/LDAPProvider.js +0 -2
  16. package/dist/esm/models/LDAPProviderRequest.d.ts +0 -6
  17. package/dist/esm/models/LDAPProviderRequest.js +0 -2
  18. package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +0 -6
  19. package/dist/esm/models/PatchedLDAPProviderRequest.js +0 -2
  20. package/dist/esm/models/PatchedSAMLProviderRequest.d.ts +18 -0
  21. package/dist/esm/models/PatchedSAMLProviderRequest.js +6 -0
  22. package/dist/esm/models/SAMLProvider.d.ts +18 -0
  23. package/dist/esm/models/SAMLProvider.js +6 -0
  24. package/dist/esm/models/SAMLProviderRequest.d.ts +18 -0
  25. package/dist/esm/models/SAMLProviderRequest.js +6 -0
  26. package/dist/esm/models/index.d.ts +1 -0
  27. package/dist/esm/models/index.js +1 -0
  28. package/dist/models/LDAPCheckAccess.d.ts +38 -0
  29. package/dist/models/LDAPCheckAccess.js +54 -0
  30. package/dist/models/LDAPOutpostConfig.d.ts +0 -6
  31. package/dist/models/LDAPOutpostConfig.js +0 -2
  32. package/dist/models/LDAPProvider.d.ts +0 -6
  33. package/dist/models/LDAPProvider.js +0 -2
  34. package/dist/models/LDAPProviderRequest.d.ts +0 -6
  35. package/dist/models/LDAPProviderRequest.js +0 -2
  36. package/dist/models/PatchedLDAPProviderRequest.d.ts +0 -6
  37. package/dist/models/PatchedLDAPProviderRequest.js +0 -2
  38. package/dist/models/PatchedSAMLProviderRequest.d.ts +18 -0
  39. package/dist/models/PatchedSAMLProviderRequest.js +6 -0
  40. package/dist/models/SAMLProvider.d.ts +18 -0
  41. package/dist/models/SAMLProvider.js +6 -0
  42. package/dist/models/SAMLProviderRequest.d.ts +18 -0
  43. package/dist/models/SAMLProviderRequest.js +6 -0
  44. package/dist/models/index.d.ts +1 -0
  45. package/dist/models/index.js +1 -0
  46. package/package.json +1 -1
  47. package/src/apis/OutpostsApi.ts +55 -5
  48. package/src/apis/ProvidersApi.ts +15 -10
  49. package/src/models/LDAPCheckAccess.ts +81 -0
  50. package/src/models/LDAPOutpostConfig.ts +0 -8
  51. package/src/models/LDAPProvider.ts +0 -8
  52. package/src/models/LDAPProviderRequest.ts +0 -8
  53. package/src/models/PatchedLDAPProviderRequest.ts +0 -8
  54. package/src/models/PatchedSAMLProviderRequest.ts +24 -0
  55. package/src/models/SAMLProvider.ts +24 -0
  56. package/src/models/SAMLProviderRequest.ts +24 -0
  57. package/src/models/index.ts +1 -0
@@ -345,8 +345,6 @@ export interface ProvidersLdapListRequest {
345
345
  page?: number;
346
346
  pageSize?: number;
347
347
  search?: string;
348
- searchGroupGroupUuidIexact?: string;
349
- searchGroupNameIexact?: string;
350
348
  tlsServerNameIexact?: string;
351
349
  uidStartNumberIexact?: number;
352
350
  }
@@ -662,6 +660,7 @@ export interface ProvidersSamlListRequest {
662
660
  backchannelApplication?: string;
663
661
  defaultRelayState?: string;
664
662
  digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
663
+ encryptionKp?: string;
665
664
  isBackchannel?: boolean;
666
665
  issuer?: string;
667
666
  name?: string;
@@ -672,6 +671,8 @@ export interface ProvidersSamlListRequest {
672
671
  propertyMappings?: Array<string>;
673
672
  search?: string;
674
673
  sessionValidNotOnOrAfter?: string;
674
+ signAssertion?: boolean;
675
+ signResponse?: boolean;
675
676
  signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
676
677
  signingKp?: string;
677
678
  spBinding?: ProvidersSamlListSpBindingEnum;
@@ -1914,14 +1915,6 @@ export class ProvidersApi extends runtime.BaseAPI {
1914
1915
  queryParameters['search'] = requestParameters.search;
1915
1916
  }
1916
1917
 
1917
- if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
1918
- queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
1919
- }
1920
-
1921
- if (requestParameters.searchGroupNameIexact !== undefined) {
1922
- queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
1923
- }
1924
-
1925
1918
  if (requestParameters.tlsServerNameIexact !== undefined) {
1926
1919
  queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
1927
1920
  }
@@ -4470,6 +4463,10 @@ export class ProvidersApi extends runtime.BaseAPI {
4470
4463
  queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
4471
4464
  }
4472
4465
 
4466
+ if (requestParameters.encryptionKp !== undefined) {
4467
+ queryParameters['encryption_kp'] = requestParameters.encryptionKp;
4468
+ }
4469
+
4473
4470
  if (requestParameters.isBackchannel !== undefined) {
4474
4471
  queryParameters['is_backchannel'] = requestParameters.isBackchannel;
4475
4472
  }
@@ -4510,6 +4507,14 @@ export class ProvidersApi extends runtime.BaseAPI {
4510
4507
  queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
4511
4508
  }
4512
4509
 
4510
+ if (requestParameters.signAssertion !== undefined) {
4511
+ queryParameters['sign_assertion'] = requestParameters.signAssertion;
4512
+ }
4513
+
4514
+ if (requestParameters.signResponse !== undefined) {
4515
+ queryParameters['sign_response'] = requestParameters.signResponse;
4516
+ }
4517
+
4513
4518
  if (requestParameters.signatureAlgorithm !== undefined) {
4514
4519
  queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
4515
4520
  }
@@ -0,0 +1,81 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2024.6.3
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+
15
+ import { exists, mapValues } from '../runtime';
16
+ import type { PolicyTestResult } from './PolicyTestResult';
17
+ import {
18
+ PolicyTestResultFromJSON,
19
+ PolicyTestResultFromJSONTyped,
20
+ PolicyTestResultToJSON,
21
+ } from './PolicyTestResult';
22
+
23
+ /**
24
+ * Base serializer class which doesn't implement create/update methods
25
+ * @export
26
+ * @interface LDAPCheckAccess
27
+ */
28
+ export interface LDAPCheckAccess {
29
+ /**
30
+ *
31
+ * @type {boolean}
32
+ * @memberof LDAPCheckAccess
33
+ */
34
+ hasSearchPermission?: boolean;
35
+ /**
36
+ *
37
+ * @type {PolicyTestResult}
38
+ * @memberof LDAPCheckAccess
39
+ */
40
+ access: PolicyTestResult;
41
+ }
42
+
43
+ /**
44
+ * Check if a given object implements the LDAPCheckAccess interface.
45
+ */
46
+ export function instanceOfLDAPCheckAccess(value: object): boolean {
47
+ let isInstance = true;
48
+ isInstance = isInstance && "access" in value;
49
+
50
+ return isInstance;
51
+ }
52
+
53
+ export function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess {
54
+ return LDAPCheckAccessFromJSONTyped(json, false);
55
+ }
56
+
57
+ export function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess {
58
+ if ((json === undefined) || (json === null)) {
59
+ return json;
60
+ }
61
+ return {
62
+
63
+ 'hasSearchPermission': !exists(json, 'has_search_permission') ? undefined : json['has_search_permission'],
64
+ 'access': PolicyTestResultFromJSON(json['access']),
65
+ };
66
+ }
67
+
68
+ export function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any {
69
+ if (value === undefined) {
70
+ return undefined;
71
+ }
72
+ if (value === null) {
73
+ return null;
74
+ }
75
+ return {
76
+
77
+ 'has_search_permission': value.hasSearchPermission,
78
+ 'access': PolicyTestResultToJSON(value.access),
79
+ };
80
+ }
81
+
@@ -56,12 +56,6 @@ export interface LDAPOutpostConfig {
56
56
  * @memberof LDAPOutpostConfig
57
57
  */
58
58
  readonly applicationSlug: string;
59
- /**
60
- * Users in this group can do search queries. If not set, every user can execute search queries.
61
- * @type {string}
62
- * @memberof LDAPOutpostConfig
63
- */
64
- searchGroup?: string | null;
65
59
  /**
66
60
  *
67
61
  * @type {string}
@@ -134,7 +128,6 @@ export function LDAPOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator: b
134
128
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
135
129
  'bindFlowSlug': json['bind_flow_slug'],
136
130
  'applicationSlug': json['application_slug'],
137
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
138
131
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
139
132
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
140
133
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -157,7 +150,6 @@ export function LDAPOutpostConfigToJSON(value?: LDAPOutpostConfig | null): any {
157
150
  'name': value.name,
158
151
  'base_dn': value.baseDn,
159
152
  'bind_flow_slug': value.bindFlowSlug,
160
- 'search_group': value.searchGroup,
161
153
  'certificate': value.certificate,
162
154
  'tls_server_name': value.tlsServerName,
163
155
  'uid_start_number': value.uidStartNumber,
@@ -110,12 +110,6 @@ export interface LDAPProvider {
110
110
  * @memberof LDAPProvider
111
111
  */
112
112
  baseDn?: string;
113
- /**
114
- * Users in this group can do search queries. If not set, every user can execute search queries.
115
- * @type {string}
116
- * @memberof LDAPProvider
117
- */
118
- searchGroup?: string | null;
119
113
  /**
120
114
  *
121
115
  * @type {string}
@@ -211,7 +205,6 @@ export function LDAPProviderFromJSONTyped(json: any, ignoreDiscriminator: boolea
211
205
  'verboseNamePlural': json['verbose_name_plural'],
212
206
  'metaModelName': json['meta_model_name'],
213
207
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
214
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
215
208
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
216
209
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
217
210
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -237,7 +230,6 @@ export function LDAPProviderToJSON(value?: LDAPProvider | null): any {
237
230
  'authorization_flow': value.authorizationFlow,
238
231
  'property_mappings': value.propertyMappings,
239
232
  'base_dn': value.baseDn,
240
- 'search_group': value.searchGroup,
241
233
  'certificate': value.certificate,
242
234
  'tls_server_name': value.tlsServerName,
243
235
  'uid_start_number': value.uidStartNumber,
@@ -56,12 +56,6 @@ export interface LDAPProviderRequest {
56
56
  * @memberof LDAPProviderRequest
57
57
  */
58
58
  baseDn?: string;
59
- /**
60
- * Users in this group can do search queries. If not set, every user can execute search queries.
61
- * @type {string}
62
- * @memberof LDAPProviderRequest
63
- */
64
- searchGroup?: string | null;
65
59
  /**
66
60
  *
67
61
  * @type {string}
@@ -132,7 +126,6 @@ export function LDAPProviderRequestFromJSONTyped(json: any, ignoreDiscriminator:
132
126
  'authorizationFlow': json['authorization_flow'],
133
127
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
134
128
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
135
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
136
129
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
137
130
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
138
131
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -157,7 +150,6 @@ export function LDAPProviderRequestToJSON(value?: LDAPProviderRequest | null): a
157
150
  'authorization_flow': value.authorizationFlow,
158
151
  'property_mappings': value.propertyMappings,
159
152
  'base_dn': value.baseDn,
160
- 'search_group': value.searchGroup,
161
153
  'certificate': value.certificate,
162
154
  'tls_server_name': value.tlsServerName,
163
155
  'uid_start_number': value.uidStartNumber,
@@ -56,12 +56,6 @@ export interface PatchedLDAPProviderRequest {
56
56
  * @memberof PatchedLDAPProviderRequest
57
57
  */
58
58
  baseDn?: string;
59
- /**
60
- * Users in this group can do search queries. If not set, every user can execute search queries.
61
- * @type {string}
62
- * @memberof PatchedLDAPProviderRequest
63
- */
64
- searchGroup?: string | null;
65
59
  /**
66
60
  *
67
61
  * @type {string}
@@ -130,7 +124,6 @@ export function PatchedLDAPProviderRequestFromJSONTyped(json: any, ignoreDiscrim
130
124
  'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
131
125
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
132
126
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
133
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
134
127
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
135
128
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
136
129
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -155,7 +148,6 @@ export function PatchedLDAPProviderRequestToJSON(value?: PatchedLDAPProviderRequ
155
148
  'authorization_flow': value.authorizationFlow,
156
149
  'property_mappings': value.propertyMappings,
157
150
  'base_dn': value.baseDn,
158
- 'search_group': value.searchGroup,
159
151
  'certificate': value.certificate,
160
152
  'tls_server_name': value.tlsServerName,
161
153
  'uid_start_number': value.uidStartNumber,
@@ -128,6 +128,24 @@ export interface PatchedSAMLProviderRequest {
128
128
  * @memberof PatchedSAMLProviderRequest
129
129
  */
130
130
  verificationKp?: string | null;
131
+ /**
132
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
133
+ * @type {string}
134
+ * @memberof PatchedSAMLProviderRequest
135
+ */
136
+ encryptionKp?: string | null;
137
+ /**
138
+ *
139
+ * @type {boolean}
140
+ * @memberof PatchedSAMLProviderRequest
141
+ */
142
+ signAssertion?: boolean;
143
+ /**
144
+ *
145
+ * @type {boolean}
146
+ * @memberof PatchedSAMLProviderRequest
147
+ */
148
+ signResponse?: boolean;
131
149
  /**
132
150
  *
133
151
  * @type {SpBindingEnum}
@@ -176,6 +194,9 @@ export function PatchedSAMLProviderRequestFromJSONTyped(json: any, ignoreDiscrim
176
194
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
177
195
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
178
196
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
197
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
198
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
199
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
179
200
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
180
201
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
181
202
  };
@@ -205,6 +226,9 @@ export function PatchedSAMLProviderRequestToJSON(value?: PatchedSAMLProviderRequ
205
226
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
206
227
  'signing_kp': value.signingKp,
207
228
  'verification_kp': value.verificationKp,
229
+ 'encryption_kp': value.encryptionKp,
230
+ 'sign_assertion': value.signAssertion,
231
+ 'sign_response': value.signResponse,
208
232
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
209
233
  'default_relay_state': value.defaultRelayState,
210
234
  };
@@ -182,6 +182,24 @@ export interface SAMLProvider {
182
182
  * @memberof SAMLProvider
183
183
  */
184
184
  verificationKp?: string | null;
185
+ /**
186
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
187
+ * @type {string}
188
+ * @memberof SAMLProvider
189
+ */
190
+ encryptionKp?: string | null;
191
+ /**
192
+ *
193
+ * @type {boolean}
194
+ * @memberof SAMLProvider
195
+ */
196
+ signAssertion?: boolean;
197
+ /**
198
+ *
199
+ * @type {boolean}
200
+ * @memberof SAMLProvider
201
+ */
202
+ signResponse?: boolean;
185
203
  /**
186
204
  *
187
205
  * @type {SpBindingEnum}
@@ -293,6 +311,9 @@ export function SAMLProviderFromJSONTyped(json: any, ignoreDiscriminator: boolea
293
311
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
294
312
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
295
313
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
314
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
315
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
316
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
296
317
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
297
318
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
298
319
  'urlDownloadMetadata': json['url_download_metadata'],
@@ -328,6 +349,9 @@ export function SAMLProviderToJSON(value?: SAMLProvider | null): any {
328
349
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
329
350
  'signing_kp': value.signingKp,
330
351
  'verification_kp': value.verificationKp,
352
+ 'encryption_kp': value.encryptionKp,
353
+ 'sign_assertion': value.signAssertion,
354
+ 'sign_response': value.signResponse,
331
355
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
332
356
  'default_relay_state': value.defaultRelayState,
333
357
  };
@@ -128,6 +128,24 @@ export interface SAMLProviderRequest {
128
128
  * @memberof SAMLProviderRequest
129
129
  */
130
130
  verificationKp?: string | null;
131
+ /**
132
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
133
+ * @type {string}
134
+ * @memberof SAMLProviderRequest
135
+ */
136
+ encryptionKp?: string | null;
137
+ /**
138
+ *
139
+ * @type {boolean}
140
+ * @memberof SAMLProviderRequest
141
+ */
142
+ signAssertion?: boolean;
143
+ /**
144
+ *
145
+ * @type {boolean}
146
+ * @memberof SAMLProviderRequest
147
+ */
148
+ signResponse?: boolean;
131
149
  /**
132
150
  *
133
151
  * @type {SpBindingEnum}
@@ -179,6 +197,9 @@ export function SAMLProviderRequestFromJSONTyped(json: any, ignoreDiscriminator:
179
197
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
180
198
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
181
199
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
200
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
201
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
202
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
182
203
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
183
204
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
184
205
  };
@@ -208,6 +229,9 @@ export function SAMLProviderRequestToJSON(value?: SAMLProviderRequest | null): a
208
229
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
209
230
  'signing_kp': value.signingKp,
210
231
  'verification_kp': value.verificationKp,
232
+ 'encryption_kp': value.encryptionKp,
233
+ 'sign_assertion': value.signAssertion,
234
+ 'sign_response': value.signResponse,
211
235
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
212
236
  'default_relay_state': value.defaultRelayState,
213
237
  };
@@ -179,6 +179,7 @@ export * from './IssuerModeEnum';
179
179
  export * from './KubernetesServiceConnection';
180
180
  export * from './KubernetesServiceConnectionRequest';
181
181
  export * from './LDAPAPIAccessMode';
182
+ export * from './LDAPCheckAccess';
182
183
  export * from './LDAPDebug';
183
184
  export * from './LDAPOutpostConfig';
184
185
  export * from './LDAPProvider';