@goauthentik/api 2024.6.3-1723645891 → 2024.6.3-1723921843
Sign up to get free protection for your applications and to get access to all the features.
- package/dist/apis/ProvidersApi.d.ts +3 -0
- package/dist/apis/ProvidersApi.js +9 -0
- package/dist/esm/apis/ProvidersApi.d.ts +3 -0
- package/dist/esm/apis/ProvidersApi.js +9 -0
- package/dist/esm/models/PatchedSAMLProviderRequest.d.ts +18 -0
- package/dist/esm/models/PatchedSAMLProviderRequest.js +6 -0
- package/dist/esm/models/SAMLProvider.d.ts +18 -0
- package/dist/esm/models/SAMLProvider.js +6 -0
- package/dist/esm/models/SAMLProviderRequest.d.ts +18 -0
- package/dist/esm/models/SAMLProviderRequest.js +6 -0
- package/dist/models/PatchedSAMLProviderRequest.d.ts +18 -0
- package/dist/models/PatchedSAMLProviderRequest.js +6 -0
- package/dist/models/SAMLProvider.d.ts +18 -0
- package/dist/models/SAMLProvider.js +6 -0
- package/dist/models/SAMLProviderRequest.d.ts +18 -0
- package/dist/models/SAMLProviderRequest.js +6 -0
- package/package.json +1 -1
- package/src/apis/ProvidersApi.ts +15 -0
- package/src/models/PatchedSAMLProviderRequest.ts +24 -0
- package/src/models/SAMLProvider.ts +24 -0
- package/src/models/SAMLProviderRequest.ts +24 -0
@@ -380,6 +380,7 @@ export interface ProvidersSamlListRequest {
|
|
380
380
|
backchannelApplication?: string;
|
381
381
|
defaultRelayState?: string;
|
382
382
|
digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
|
383
|
+
encryptionKp?: string;
|
383
384
|
isBackchannel?: boolean;
|
384
385
|
issuer?: string;
|
385
386
|
name?: string;
|
@@ -390,6 +391,8 @@ export interface ProvidersSamlListRequest {
|
|
390
391
|
propertyMappings?: Array<string>;
|
391
392
|
search?: string;
|
392
393
|
sessionValidNotOnOrAfter?: string;
|
394
|
+
signAssertion?: boolean;
|
395
|
+
signResponse?: boolean;
|
393
396
|
signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
|
394
397
|
signingKp?: string;
|
395
398
|
spBinding?: ProvidersSamlListSpBindingEnum;
|
@@ -3293,6 +3293,9 @@ class ProvidersApi extends runtime.BaseAPI {
|
|
3293
3293
|
if (requestParameters.digestAlgorithm !== undefined) {
|
3294
3294
|
queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
|
3295
3295
|
}
|
3296
|
+
if (requestParameters.encryptionKp !== undefined) {
|
3297
|
+
queryParameters['encryption_kp'] = requestParameters.encryptionKp;
|
3298
|
+
}
|
3296
3299
|
if (requestParameters.isBackchannel !== undefined) {
|
3297
3300
|
queryParameters['is_backchannel'] = requestParameters.isBackchannel;
|
3298
3301
|
}
|
@@ -3323,6 +3326,12 @@ class ProvidersApi extends runtime.BaseAPI {
|
|
3323
3326
|
if (requestParameters.sessionValidNotOnOrAfter !== undefined) {
|
3324
3327
|
queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
|
3325
3328
|
}
|
3329
|
+
if (requestParameters.signAssertion !== undefined) {
|
3330
|
+
queryParameters['sign_assertion'] = requestParameters.signAssertion;
|
3331
|
+
}
|
3332
|
+
if (requestParameters.signResponse !== undefined) {
|
3333
|
+
queryParameters['sign_response'] = requestParameters.signResponse;
|
3334
|
+
}
|
3326
3335
|
if (requestParameters.signatureAlgorithm !== undefined) {
|
3327
3336
|
queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
|
3328
3337
|
}
|
@@ -380,6 +380,7 @@ export interface ProvidersSamlListRequest {
|
|
380
380
|
backchannelApplication?: string;
|
381
381
|
defaultRelayState?: string;
|
382
382
|
digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
|
383
|
+
encryptionKp?: string;
|
383
384
|
isBackchannel?: boolean;
|
384
385
|
issuer?: string;
|
385
386
|
name?: string;
|
@@ -390,6 +391,8 @@ export interface ProvidersSamlListRequest {
|
|
390
391
|
propertyMappings?: Array<string>;
|
391
392
|
search?: string;
|
392
393
|
sessionValidNotOnOrAfter?: string;
|
394
|
+
signAssertion?: boolean;
|
395
|
+
signResponse?: boolean;
|
393
396
|
signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
|
394
397
|
signingKp?: string;
|
395
398
|
spBinding?: ProvidersSamlListSpBindingEnum;
|
@@ -3290,6 +3290,9 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
3290
3290
|
if (requestParameters.digestAlgorithm !== undefined) {
|
3291
3291
|
queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
|
3292
3292
|
}
|
3293
|
+
if (requestParameters.encryptionKp !== undefined) {
|
3294
|
+
queryParameters['encryption_kp'] = requestParameters.encryptionKp;
|
3295
|
+
}
|
3293
3296
|
if (requestParameters.isBackchannel !== undefined) {
|
3294
3297
|
queryParameters['is_backchannel'] = requestParameters.isBackchannel;
|
3295
3298
|
}
|
@@ -3320,6 +3323,12 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
3320
3323
|
if (requestParameters.sessionValidNotOnOrAfter !== undefined) {
|
3321
3324
|
queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
|
3322
3325
|
}
|
3326
|
+
if (requestParameters.signAssertion !== undefined) {
|
3327
|
+
queryParameters['sign_assertion'] = requestParameters.signAssertion;
|
3328
|
+
}
|
3329
|
+
if (requestParameters.signResponse !== undefined) {
|
3330
|
+
queryParameters['sign_response'] = requestParameters.signResponse;
|
3331
|
+
}
|
3323
3332
|
if (requestParameters.signatureAlgorithm !== undefined) {
|
3324
3333
|
queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
|
3325
3334
|
}
|
@@ -108,6 +108,24 @@ export interface PatchedSAMLProviderRequest {
|
|
108
108
|
* @memberof PatchedSAMLProviderRequest
|
109
109
|
*/
|
110
110
|
verificationKp?: string | null;
|
111
|
+
/**
|
112
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
113
|
+
* @type {string}
|
114
|
+
* @memberof PatchedSAMLProviderRequest
|
115
|
+
*/
|
116
|
+
encryptionKp?: string | null;
|
117
|
+
/**
|
118
|
+
*
|
119
|
+
* @type {boolean}
|
120
|
+
* @memberof PatchedSAMLProviderRequest
|
121
|
+
*/
|
122
|
+
signAssertion?: boolean;
|
123
|
+
/**
|
124
|
+
*
|
125
|
+
* @type {boolean}
|
126
|
+
* @memberof PatchedSAMLProviderRequest
|
127
|
+
*/
|
128
|
+
signResponse?: boolean;
|
111
129
|
/**
|
112
130
|
*
|
113
131
|
* @type {SpBindingEnum}
|
@@ -45,6 +45,9 @@ export function PatchedSAMLProviderRequestFromJSONTyped(json, ignoreDiscriminato
|
|
45
45
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
46
46
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
47
47
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
48
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
49
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
50
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
48
51
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
49
52
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
50
53
|
};
|
@@ -72,6 +75,9 @@ export function PatchedSAMLProviderRequestToJSON(value) {
|
|
72
75
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
73
76
|
'signing_kp': value.signingKp,
|
74
77
|
'verification_kp': value.verificationKp,
|
78
|
+
'encryption_kp': value.encryptionKp,
|
79
|
+
'sign_assertion': value.signAssertion,
|
80
|
+
'sign_response': value.signResponse,
|
75
81
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
76
82
|
'default_relay_state': value.defaultRelayState,
|
77
83
|
};
|
@@ -162,6 +162,24 @@ export interface SAMLProvider {
|
|
162
162
|
* @memberof SAMLProvider
|
163
163
|
*/
|
164
164
|
verificationKp?: string | null;
|
165
|
+
/**
|
166
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
167
|
+
* @type {string}
|
168
|
+
* @memberof SAMLProvider
|
169
|
+
*/
|
170
|
+
encryptionKp?: string | null;
|
171
|
+
/**
|
172
|
+
*
|
173
|
+
* @type {boolean}
|
174
|
+
* @memberof SAMLProvider
|
175
|
+
*/
|
176
|
+
signAssertion?: boolean;
|
177
|
+
/**
|
178
|
+
*
|
179
|
+
* @type {boolean}
|
180
|
+
* @memberof SAMLProvider
|
181
|
+
*/
|
182
|
+
signResponse?: boolean;
|
165
183
|
/**
|
166
184
|
*
|
167
185
|
* @type {SpBindingEnum}
|
@@ -72,6 +72,9 @@ export function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
72
72
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
73
73
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
74
74
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
75
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
76
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
77
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
75
78
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
76
79
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
77
80
|
'urlDownloadMetadata': json['url_download_metadata'],
|
@@ -105,6 +108,9 @@ export function SAMLProviderToJSON(value) {
|
|
105
108
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
106
109
|
'signing_kp': value.signingKp,
|
107
110
|
'verification_kp': value.verificationKp,
|
111
|
+
'encryption_kp': value.encryptionKp,
|
112
|
+
'sign_assertion': value.signAssertion,
|
113
|
+
'sign_response': value.signResponse,
|
108
114
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
109
115
|
'default_relay_state': value.defaultRelayState,
|
110
116
|
};
|
@@ -108,6 +108,24 @@ export interface SAMLProviderRequest {
|
|
108
108
|
* @memberof SAMLProviderRequest
|
109
109
|
*/
|
110
110
|
verificationKp?: string | null;
|
111
|
+
/**
|
112
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
113
|
+
* @type {string}
|
114
|
+
* @memberof SAMLProviderRequest
|
115
|
+
*/
|
116
|
+
encryptionKp?: string | null;
|
117
|
+
/**
|
118
|
+
*
|
119
|
+
* @type {boolean}
|
120
|
+
* @memberof SAMLProviderRequest
|
121
|
+
*/
|
122
|
+
signAssertion?: boolean;
|
123
|
+
/**
|
124
|
+
*
|
125
|
+
* @type {boolean}
|
126
|
+
* @memberof SAMLProviderRequest
|
127
|
+
*/
|
128
|
+
signResponse?: boolean;
|
111
129
|
/**
|
112
130
|
*
|
113
131
|
* @type {SpBindingEnum}
|
@@ -48,6 +48,9 @@ export function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
48
48
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
49
49
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
50
50
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
51
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
52
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
53
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
51
54
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
52
55
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
53
56
|
};
|
@@ -75,6 +78,9 @@ export function SAMLProviderRequestToJSON(value) {
|
|
75
78
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
76
79
|
'signing_kp': value.signingKp,
|
77
80
|
'verification_kp': value.verificationKp,
|
81
|
+
'encryption_kp': value.encryptionKp,
|
82
|
+
'sign_assertion': value.signAssertion,
|
83
|
+
'sign_response': value.signResponse,
|
78
84
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
79
85
|
'default_relay_state': value.defaultRelayState,
|
80
86
|
};
|
@@ -108,6 +108,24 @@ export interface PatchedSAMLProviderRequest {
|
|
108
108
|
* @memberof PatchedSAMLProviderRequest
|
109
109
|
*/
|
110
110
|
verificationKp?: string | null;
|
111
|
+
/**
|
112
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
113
|
+
* @type {string}
|
114
|
+
* @memberof PatchedSAMLProviderRequest
|
115
|
+
*/
|
116
|
+
encryptionKp?: string | null;
|
117
|
+
/**
|
118
|
+
*
|
119
|
+
* @type {boolean}
|
120
|
+
* @memberof PatchedSAMLProviderRequest
|
121
|
+
*/
|
122
|
+
signAssertion?: boolean;
|
123
|
+
/**
|
124
|
+
*
|
125
|
+
* @type {boolean}
|
126
|
+
* @memberof PatchedSAMLProviderRequest
|
127
|
+
*/
|
128
|
+
signResponse?: boolean;
|
111
129
|
/**
|
112
130
|
*
|
113
131
|
* @type {SpBindingEnum}
|
@@ -50,6 +50,9 @@ function PatchedSAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
50
50
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
51
51
|
'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
|
52
52
|
'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
|
53
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
54
|
+
'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
55
|
+
'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
|
53
56
|
'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
|
54
57
|
'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
55
58
|
};
|
@@ -78,6 +81,9 @@ function PatchedSAMLProviderRequestToJSON(value) {
|
|
78
81
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
79
82
|
'signing_kp': value.signingKp,
|
80
83
|
'verification_kp': value.verificationKp,
|
84
|
+
'encryption_kp': value.encryptionKp,
|
85
|
+
'sign_assertion': value.signAssertion,
|
86
|
+
'sign_response': value.signResponse,
|
81
87
|
'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
|
82
88
|
'default_relay_state': value.defaultRelayState,
|
83
89
|
};
|
@@ -162,6 +162,24 @@ export interface SAMLProvider {
|
|
162
162
|
* @memberof SAMLProvider
|
163
163
|
*/
|
164
164
|
verificationKp?: string | null;
|
165
|
+
/**
|
166
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
167
|
+
* @type {string}
|
168
|
+
* @memberof SAMLProvider
|
169
|
+
*/
|
170
|
+
encryptionKp?: string | null;
|
171
|
+
/**
|
172
|
+
*
|
173
|
+
* @type {boolean}
|
174
|
+
* @memberof SAMLProvider
|
175
|
+
*/
|
176
|
+
signAssertion?: boolean;
|
177
|
+
/**
|
178
|
+
*
|
179
|
+
* @type {boolean}
|
180
|
+
* @memberof SAMLProvider
|
181
|
+
*/
|
182
|
+
signResponse?: boolean;
|
165
183
|
/**
|
166
184
|
*
|
167
185
|
* @type {SpBindingEnum}
|
@@ -77,6 +77,9 @@ function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
77
77
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
78
78
|
'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
|
79
79
|
'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
|
80
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
81
|
+
'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
82
|
+
'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
|
80
83
|
'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
|
81
84
|
'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
82
85
|
'urlDownloadMetadata': json['url_download_metadata'],
|
@@ -111,6 +114,9 @@ function SAMLProviderToJSON(value) {
|
|
111
114
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
112
115
|
'signing_kp': value.signingKp,
|
113
116
|
'verification_kp': value.verificationKp,
|
117
|
+
'encryption_kp': value.encryptionKp,
|
118
|
+
'sign_assertion': value.signAssertion,
|
119
|
+
'sign_response': value.signResponse,
|
114
120
|
'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
|
115
121
|
'default_relay_state': value.defaultRelayState,
|
116
122
|
};
|
@@ -108,6 +108,24 @@ export interface SAMLProviderRequest {
|
|
108
108
|
* @memberof SAMLProviderRequest
|
109
109
|
*/
|
110
110
|
verificationKp?: string | null;
|
111
|
+
/**
|
112
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
113
|
+
* @type {string}
|
114
|
+
* @memberof SAMLProviderRequest
|
115
|
+
*/
|
116
|
+
encryptionKp?: string | null;
|
117
|
+
/**
|
118
|
+
*
|
119
|
+
* @type {boolean}
|
120
|
+
* @memberof SAMLProviderRequest
|
121
|
+
*/
|
122
|
+
signAssertion?: boolean;
|
123
|
+
/**
|
124
|
+
*
|
125
|
+
* @type {boolean}
|
126
|
+
* @memberof SAMLProviderRequest
|
127
|
+
*/
|
128
|
+
signResponse?: boolean;
|
111
129
|
/**
|
112
130
|
*
|
113
131
|
* @type {SpBindingEnum}
|
@@ -53,6 +53,9 @@ function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
53
53
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
54
54
|
'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
|
55
55
|
'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
|
56
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
57
|
+
'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
58
|
+
'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
|
56
59
|
'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
|
57
60
|
'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
58
61
|
};
|
@@ -81,6 +84,9 @@ function SAMLProviderRequestToJSON(value) {
|
|
81
84
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
82
85
|
'signing_kp': value.signingKp,
|
83
86
|
'verification_kp': value.verificationKp,
|
87
|
+
'encryption_kp': value.encryptionKp,
|
88
|
+
'sign_assertion': value.signAssertion,
|
89
|
+
'sign_response': value.signResponse,
|
84
90
|
'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
|
85
91
|
'default_relay_state': value.defaultRelayState,
|
86
92
|
};
|
package/package.json
CHANGED
package/src/apis/ProvidersApi.ts
CHANGED
@@ -660,6 +660,7 @@ export interface ProvidersSamlListRequest {
|
|
660
660
|
backchannelApplication?: string;
|
661
661
|
defaultRelayState?: string;
|
662
662
|
digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
|
663
|
+
encryptionKp?: string;
|
663
664
|
isBackchannel?: boolean;
|
664
665
|
issuer?: string;
|
665
666
|
name?: string;
|
@@ -670,6 +671,8 @@ export interface ProvidersSamlListRequest {
|
|
670
671
|
propertyMappings?: Array<string>;
|
671
672
|
search?: string;
|
672
673
|
sessionValidNotOnOrAfter?: string;
|
674
|
+
signAssertion?: boolean;
|
675
|
+
signResponse?: boolean;
|
673
676
|
signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
|
674
677
|
signingKp?: string;
|
675
678
|
spBinding?: ProvidersSamlListSpBindingEnum;
|
@@ -4460,6 +4463,10 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
4460
4463
|
queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
|
4461
4464
|
}
|
4462
4465
|
|
4466
|
+
if (requestParameters.encryptionKp !== undefined) {
|
4467
|
+
queryParameters['encryption_kp'] = requestParameters.encryptionKp;
|
4468
|
+
}
|
4469
|
+
|
4463
4470
|
if (requestParameters.isBackchannel !== undefined) {
|
4464
4471
|
queryParameters['is_backchannel'] = requestParameters.isBackchannel;
|
4465
4472
|
}
|
@@ -4500,6 +4507,14 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
4500
4507
|
queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
|
4501
4508
|
}
|
4502
4509
|
|
4510
|
+
if (requestParameters.signAssertion !== undefined) {
|
4511
|
+
queryParameters['sign_assertion'] = requestParameters.signAssertion;
|
4512
|
+
}
|
4513
|
+
|
4514
|
+
if (requestParameters.signResponse !== undefined) {
|
4515
|
+
queryParameters['sign_response'] = requestParameters.signResponse;
|
4516
|
+
}
|
4517
|
+
|
4503
4518
|
if (requestParameters.signatureAlgorithm !== undefined) {
|
4504
4519
|
queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
|
4505
4520
|
}
|
@@ -128,6 +128,24 @@ export interface PatchedSAMLProviderRequest {
|
|
128
128
|
* @memberof PatchedSAMLProviderRequest
|
129
129
|
*/
|
130
130
|
verificationKp?: string | null;
|
131
|
+
/**
|
132
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
133
|
+
* @type {string}
|
134
|
+
* @memberof PatchedSAMLProviderRequest
|
135
|
+
*/
|
136
|
+
encryptionKp?: string | null;
|
137
|
+
/**
|
138
|
+
*
|
139
|
+
* @type {boolean}
|
140
|
+
* @memberof PatchedSAMLProviderRequest
|
141
|
+
*/
|
142
|
+
signAssertion?: boolean;
|
143
|
+
/**
|
144
|
+
*
|
145
|
+
* @type {boolean}
|
146
|
+
* @memberof PatchedSAMLProviderRequest
|
147
|
+
*/
|
148
|
+
signResponse?: boolean;
|
131
149
|
/**
|
132
150
|
*
|
133
151
|
* @type {SpBindingEnum}
|
@@ -176,6 +194,9 @@ export function PatchedSAMLProviderRequestFromJSONTyped(json: any, ignoreDiscrim
|
|
176
194
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
177
195
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
178
196
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
197
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
198
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
199
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
179
200
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
180
201
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
181
202
|
};
|
@@ -205,6 +226,9 @@ export function PatchedSAMLProviderRequestToJSON(value?: PatchedSAMLProviderRequ
|
|
205
226
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
206
227
|
'signing_kp': value.signingKp,
|
207
228
|
'verification_kp': value.verificationKp,
|
229
|
+
'encryption_kp': value.encryptionKp,
|
230
|
+
'sign_assertion': value.signAssertion,
|
231
|
+
'sign_response': value.signResponse,
|
208
232
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
209
233
|
'default_relay_state': value.defaultRelayState,
|
210
234
|
};
|
@@ -182,6 +182,24 @@ export interface SAMLProvider {
|
|
182
182
|
* @memberof SAMLProvider
|
183
183
|
*/
|
184
184
|
verificationKp?: string | null;
|
185
|
+
/**
|
186
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
187
|
+
* @type {string}
|
188
|
+
* @memberof SAMLProvider
|
189
|
+
*/
|
190
|
+
encryptionKp?: string | null;
|
191
|
+
/**
|
192
|
+
*
|
193
|
+
* @type {boolean}
|
194
|
+
* @memberof SAMLProvider
|
195
|
+
*/
|
196
|
+
signAssertion?: boolean;
|
197
|
+
/**
|
198
|
+
*
|
199
|
+
* @type {boolean}
|
200
|
+
* @memberof SAMLProvider
|
201
|
+
*/
|
202
|
+
signResponse?: boolean;
|
185
203
|
/**
|
186
204
|
*
|
187
205
|
* @type {SpBindingEnum}
|
@@ -293,6 +311,9 @@ export function SAMLProviderFromJSONTyped(json: any, ignoreDiscriminator: boolea
|
|
293
311
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
294
312
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
295
313
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
314
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
315
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
316
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
296
317
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
297
318
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
298
319
|
'urlDownloadMetadata': json['url_download_metadata'],
|
@@ -328,6 +349,9 @@ export function SAMLProviderToJSON(value?: SAMLProvider | null): any {
|
|
328
349
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
329
350
|
'signing_kp': value.signingKp,
|
330
351
|
'verification_kp': value.verificationKp,
|
352
|
+
'encryption_kp': value.encryptionKp,
|
353
|
+
'sign_assertion': value.signAssertion,
|
354
|
+
'sign_response': value.signResponse,
|
331
355
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
332
356
|
'default_relay_state': value.defaultRelayState,
|
333
357
|
};
|
@@ -128,6 +128,24 @@ export interface SAMLProviderRequest {
|
|
128
128
|
* @memberof SAMLProviderRequest
|
129
129
|
*/
|
130
130
|
verificationKp?: string | null;
|
131
|
+
/**
|
132
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
133
|
+
* @type {string}
|
134
|
+
* @memberof SAMLProviderRequest
|
135
|
+
*/
|
136
|
+
encryptionKp?: string | null;
|
137
|
+
/**
|
138
|
+
*
|
139
|
+
* @type {boolean}
|
140
|
+
* @memberof SAMLProviderRequest
|
141
|
+
*/
|
142
|
+
signAssertion?: boolean;
|
143
|
+
/**
|
144
|
+
*
|
145
|
+
* @type {boolean}
|
146
|
+
* @memberof SAMLProviderRequest
|
147
|
+
*/
|
148
|
+
signResponse?: boolean;
|
131
149
|
/**
|
132
150
|
*
|
133
151
|
* @type {SpBindingEnum}
|
@@ -179,6 +197,9 @@ export function SAMLProviderRequestFromJSONTyped(json: any, ignoreDiscriminator:
|
|
179
197
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
180
198
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
181
199
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
200
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
201
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
202
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
182
203
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
183
204
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
184
205
|
};
|
@@ -208,6 +229,9 @@ export function SAMLProviderRequestToJSON(value?: SAMLProviderRequest | null): a
|
|
208
229
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
209
230
|
'signing_kp': value.signingKp,
|
210
231
|
'verification_kp': value.verificationKp,
|
232
|
+
'encryption_kp': value.encryptionKp,
|
233
|
+
'sign_assertion': value.signAssertion,
|
234
|
+
'sign_response': value.signResponse,
|
211
235
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
212
236
|
'default_relay_state': value.defaultRelayState,
|
213
237
|
};
|