@goauthentik/api 2024.6.3-1723645891 → 2024.6.3-1723921843

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -380,6 +380,7 @@ export interface ProvidersSamlListRequest {
380
380
  backchannelApplication?: string;
381
381
  defaultRelayState?: string;
382
382
  digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
383
+ encryptionKp?: string;
383
384
  isBackchannel?: boolean;
384
385
  issuer?: string;
385
386
  name?: string;
@@ -390,6 +391,8 @@ export interface ProvidersSamlListRequest {
390
391
  propertyMappings?: Array<string>;
391
392
  search?: string;
392
393
  sessionValidNotOnOrAfter?: string;
394
+ signAssertion?: boolean;
395
+ signResponse?: boolean;
393
396
  signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
394
397
  signingKp?: string;
395
398
  spBinding?: ProvidersSamlListSpBindingEnum;
@@ -3293,6 +3293,9 @@ class ProvidersApi extends runtime.BaseAPI {
3293
3293
  if (requestParameters.digestAlgorithm !== undefined) {
3294
3294
  queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
3295
3295
  }
3296
+ if (requestParameters.encryptionKp !== undefined) {
3297
+ queryParameters['encryption_kp'] = requestParameters.encryptionKp;
3298
+ }
3296
3299
  if (requestParameters.isBackchannel !== undefined) {
3297
3300
  queryParameters['is_backchannel'] = requestParameters.isBackchannel;
3298
3301
  }
@@ -3323,6 +3326,12 @@ class ProvidersApi extends runtime.BaseAPI {
3323
3326
  if (requestParameters.sessionValidNotOnOrAfter !== undefined) {
3324
3327
  queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
3325
3328
  }
3329
+ if (requestParameters.signAssertion !== undefined) {
3330
+ queryParameters['sign_assertion'] = requestParameters.signAssertion;
3331
+ }
3332
+ if (requestParameters.signResponse !== undefined) {
3333
+ queryParameters['sign_response'] = requestParameters.signResponse;
3334
+ }
3326
3335
  if (requestParameters.signatureAlgorithm !== undefined) {
3327
3336
  queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
3328
3337
  }
@@ -380,6 +380,7 @@ export interface ProvidersSamlListRequest {
380
380
  backchannelApplication?: string;
381
381
  defaultRelayState?: string;
382
382
  digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
383
+ encryptionKp?: string;
383
384
  isBackchannel?: boolean;
384
385
  issuer?: string;
385
386
  name?: string;
@@ -390,6 +391,8 @@ export interface ProvidersSamlListRequest {
390
391
  propertyMappings?: Array<string>;
391
392
  search?: string;
392
393
  sessionValidNotOnOrAfter?: string;
394
+ signAssertion?: boolean;
395
+ signResponse?: boolean;
393
396
  signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
394
397
  signingKp?: string;
395
398
  spBinding?: ProvidersSamlListSpBindingEnum;
@@ -3290,6 +3290,9 @@ export class ProvidersApi extends runtime.BaseAPI {
3290
3290
  if (requestParameters.digestAlgorithm !== undefined) {
3291
3291
  queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
3292
3292
  }
3293
+ if (requestParameters.encryptionKp !== undefined) {
3294
+ queryParameters['encryption_kp'] = requestParameters.encryptionKp;
3295
+ }
3293
3296
  if (requestParameters.isBackchannel !== undefined) {
3294
3297
  queryParameters['is_backchannel'] = requestParameters.isBackchannel;
3295
3298
  }
@@ -3320,6 +3323,12 @@ export class ProvidersApi extends runtime.BaseAPI {
3320
3323
  if (requestParameters.sessionValidNotOnOrAfter !== undefined) {
3321
3324
  queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
3322
3325
  }
3326
+ if (requestParameters.signAssertion !== undefined) {
3327
+ queryParameters['sign_assertion'] = requestParameters.signAssertion;
3328
+ }
3329
+ if (requestParameters.signResponse !== undefined) {
3330
+ queryParameters['sign_response'] = requestParameters.signResponse;
3331
+ }
3323
3332
  if (requestParameters.signatureAlgorithm !== undefined) {
3324
3333
  queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
3325
3334
  }
@@ -108,6 +108,24 @@ export interface PatchedSAMLProviderRequest {
108
108
  * @memberof PatchedSAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof PatchedSAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof PatchedSAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof PatchedSAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}
@@ -45,6 +45,9 @@ export function PatchedSAMLProviderRequestFromJSONTyped(json, ignoreDiscriminato
45
45
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
46
46
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
47
47
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
48
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
49
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
50
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
48
51
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
49
52
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
50
53
  };
@@ -72,6 +75,9 @@ export function PatchedSAMLProviderRequestToJSON(value) {
72
75
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
73
76
  'signing_kp': value.signingKp,
74
77
  'verification_kp': value.verificationKp,
78
+ 'encryption_kp': value.encryptionKp,
79
+ 'sign_assertion': value.signAssertion,
80
+ 'sign_response': value.signResponse,
75
81
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
76
82
  'default_relay_state': value.defaultRelayState,
77
83
  };
@@ -162,6 +162,24 @@ export interface SAMLProvider {
162
162
  * @memberof SAMLProvider
163
163
  */
164
164
  verificationKp?: string | null;
165
+ /**
166
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
167
+ * @type {string}
168
+ * @memberof SAMLProvider
169
+ */
170
+ encryptionKp?: string | null;
171
+ /**
172
+ *
173
+ * @type {boolean}
174
+ * @memberof SAMLProvider
175
+ */
176
+ signAssertion?: boolean;
177
+ /**
178
+ *
179
+ * @type {boolean}
180
+ * @memberof SAMLProvider
181
+ */
182
+ signResponse?: boolean;
165
183
  /**
166
184
  *
167
185
  * @type {SpBindingEnum}
@@ -72,6 +72,9 @@ export function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
72
72
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
73
73
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
74
74
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
75
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
76
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
77
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
75
78
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
76
79
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
77
80
  'urlDownloadMetadata': json['url_download_metadata'],
@@ -105,6 +108,9 @@ export function SAMLProviderToJSON(value) {
105
108
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
106
109
  'signing_kp': value.signingKp,
107
110
  'verification_kp': value.verificationKp,
111
+ 'encryption_kp': value.encryptionKp,
112
+ 'sign_assertion': value.signAssertion,
113
+ 'sign_response': value.signResponse,
108
114
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
109
115
  'default_relay_state': value.defaultRelayState,
110
116
  };
@@ -108,6 +108,24 @@ export interface SAMLProviderRequest {
108
108
  * @memberof SAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof SAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof SAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof SAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}
@@ -48,6 +48,9 @@ export function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
48
48
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
49
49
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
50
50
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
51
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
52
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
53
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
51
54
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
52
55
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
53
56
  };
@@ -75,6 +78,9 @@ export function SAMLProviderRequestToJSON(value) {
75
78
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
76
79
  'signing_kp': value.signingKp,
77
80
  'verification_kp': value.verificationKp,
81
+ 'encryption_kp': value.encryptionKp,
82
+ 'sign_assertion': value.signAssertion,
83
+ 'sign_response': value.signResponse,
78
84
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
79
85
  'default_relay_state': value.defaultRelayState,
80
86
  };
@@ -108,6 +108,24 @@ export interface PatchedSAMLProviderRequest {
108
108
  * @memberof PatchedSAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof PatchedSAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof PatchedSAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof PatchedSAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}
@@ -50,6 +50,9 @@ function PatchedSAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
50
50
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
51
51
  'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
52
52
  'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
53
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
54
+ 'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
55
+ 'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
53
56
  'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
54
57
  'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
55
58
  };
@@ -78,6 +81,9 @@ function PatchedSAMLProviderRequestToJSON(value) {
78
81
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
79
82
  'signing_kp': value.signingKp,
80
83
  'verification_kp': value.verificationKp,
84
+ 'encryption_kp': value.encryptionKp,
85
+ 'sign_assertion': value.signAssertion,
86
+ 'sign_response': value.signResponse,
81
87
  'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
82
88
  'default_relay_state': value.defaultRelayState,
83
89
  };
@@ -162,6 +162,24 @@ export interface SAMLProvider {
162
162
  * @memberof SAMLProvider
163
163
  */
164
164
  verificationKp?: string | null;
165
+ /**
166
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
167
+ * @type {string}
168
+ * @memberof SAMLProvider
169
+ */
170
+ encryptionKp?: string | null;
171
+ /**
172
+ *
173
+ * @type {boolean}
174
+ * @memberof SAMLProvider
175
+ */
176
+ signAssertion?: boolean;
177
+ /**
178
+ *
179
+ * @type {boolean}
180
+ * @memberof SAMLProvider
181
+ */
182
+ signResponse?: boolean;
165
183
  /**
166
184
  *
167
185
  * @type {SpBindingEnum}
@@ -77,6 +77,9 @@ function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
77
77
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
78
78
  'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
79
79
  'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
80
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
81
+ 'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
82
+ 'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
80
83
  'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
81
84
  'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
82
85
  'urlDownloadMetadata': json['url_download_metadata'],
@@ -111,6 +114,9 @@ function SAMLProviderToJSON(value) {
111
114
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
112
115
  'signing_kp': value.signingKp,
113
116
  'verification_kp': value.verificationKp,
117
+ 'encryption_kp': value.encryptionKp,
118
+ 'sign_assertion': value.signAssertion,
119
+ 'sign_response': value.signResponse,
114
120
  'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
115
121
  'default_relay_state': value.defaultRelayState,
116
122
  };
@@ -108,6 +108,24 @@ export interface SAMLProviderRequest {
108
108
  * @memberof SAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof SAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof SAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof SAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}
@@ -53,6 +53,9 @@ function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
53
53
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
54
54
  'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
55
55
  'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
56
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
57
+ 'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
58
+ 'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
56
59
  'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
57
60
  'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
58
61
  };
@@ -81,6 +84,9 @@ function SAMLProviderRequestToJSON(value) {
81
84
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
82
85
  'signing_kp': value.signingKp,
83
86
  'verification_kp': value.verificationKp,
87
+ 'encryption_kp': value.encryptionKp,
88
+ 'sign_assertion': value.signAssertion,
89
+ 'sign_response': value.signResponse,
84
90
  'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
85
91
  'default_relay_state': value.defaultRelayState,
86
92
  };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2024.6.3-1723645891",
3
+ "version": "2024.6.3-1723921843",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -660,6 +660,7 @@ export interface ProvidersSamlListRequest {
660
660
  backchannelApplication?: string;
661
661
  defaultRelayState?: string;
662
662
  digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
663
+ encryptionKp?: string;
663
664
  isBackchannel?: boolean;
664
665
  issuer?: string;
665
666
  name?: string;
@@ -670,6 +671,8 @@ export interface ProvidersSamlListRequest {
670
671
  propertyMappings?: Array<string>;
671
672
  search?: string;
672
673
  sessionValidNotOnOrAfter?: string;
674
+ signAssertion?: boolean;
675
+ signResponse?: boolean;
673
676
  signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
674
677
  signingKp?: string;
675
678
  spBinding?: ProvidersSamlListSpBindingEnum;
@@ -4460,6 +4463,10 @@ export class ProvidersApi extends runtime.BaseAPI {
4460
4463
  queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
4461
4464
  }
4462
4465
 
4466
+ if (requestParameters.encryptionKp !== undefined) {
4467
+ queryParameters['encryption_kp'] = requestParameters.encryptionKp;
4468
+ }
4469
+
4463
4470
  if (requestParameters.isBackchannel !== undefined) {
4464
4471
  queryParameters['is_backchannel'] = requestParameters.isBackchannel;
4465
4472
  }
@@ -4500,6 +4507,14 @@ export class ProvidersApi extends runtime.BaseAPI {
4500
4507
  queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
4501
4508
  }
4502
4509
 
4510
+ if (requestParameters.signAssertion !== undefined) {
4511
+ queryParameters['sign_assertion'] = requestParameters.signAssertion;
4512
+ }
4513
+
4514
+ if (requestParameters.signResponse !== undefined) {
4515
+ queryParameters['sign_response'] = requestParameters.signResponse;
4516
+ }
4517
+
4503
4518
  if (requestParameters.signatureAlgorithm !== undefined) {
4504
4519
  queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
4505
4520
  }
@@ -128,6 +128,24 @@ export interface PatchedSAMLProviderRequest {
128
128
  * @memberof PatchedSAMLProviderRequest
129
129
  */
130
130
  verificationKp?: string | null;
131
+ /**
132
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
133
+ * @type {string}
134
+ * @memberof PatchedSAMLProviderRequest
135
+ */
136
+ encryptionKp?: string | null;
137
+ /**
138
+ *
139
+ * @type {boolean}
140
+ * @memberof PatchedSAMLProviderRequest
141
+ */
142
+ signAssertion?: boolean;
143
+ /**
144
+ *
145
+ * @type {boolean}
146
+ * @memberof PatchedSAMLProviderRequest
147
+ */
148
+ signResponse?: boolean;
131
149
  /**
132
150
  *
133
151
  * @type {SpBindingEnum}
@@ -176,6 +194,9 @@ export function PatchedSAMLProviderRequestFromJSONTyped(json: any, ignoreDiscrim
176
194
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
177
195
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
178
196
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
197
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
198
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
199
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
179
200
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
180
201
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
181
202
  };
@@ -205,6 +226,9 @@ export function PatchedSAMLProviderRequestToJSON(value?: PatchedSAMLProviderRequ
205
226
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
206
227
  'signing_kp': value.signingKp,
207
228
  'verification_kp': value.verificationKp,
229
+ 'encryption_kp': value.encryptionKp,
230
+ 'sign_assertion': value.signAssertion,
231
+ 'sign_response': value.signResponse,
208
232
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
209
233
  'default_relay_state': value.defaultRelayState,
210
234
  };
@@ -182,6 +182,24 @@ export interface SAMLProvider {
182
182
  * @memberof SAMLProvider
183
183
  */
184
184
  verificationKp?: string | null;
185
+ /**
186
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
187
+ * @type {string}
188
+ * @memberof SAMLProvider
189
+ */
190
+ encryptionKp?: string | null;
191
+ /**
192
+ *
193
+ * @type {boolean}
194
+ * @memberof SAMLProvider
195
+ */
196
+ signAssertion?: boolean;
197
+ /**
198
+ *
199
+ * @type {boolean}
200
+ * @memberof SAMLProvider
201
+ */
202
+ signResponse?: boolean;
185
203
  /**
186
204
  *
187
205
  * @type {SpBindingEnum}
@@ -293,6 +311,9 @@ export function SAMLProviderFromJSONTyped(json: any, ignoreDiscriminator: boolea
293
311
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
294
312
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
295
313
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
314
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
315
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
316
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
296
317
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
297
318
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
298
319
  'urlDownloadMetadata': json['url_download_metadata'],
@@ -328,6 +349,9 @@ export function SAMLProviderToJSON(value?: SAMLProvider | null): any {
328
349
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
329
350
  'signing_kp': value.signingKp,
330
351
  'verification_kp': value.verificationKp,
352
+ 'encryption_kp': value.encryptionKp,
353
+ 'sign_assertion': value.signAssertion,
354
+ 'sign_response': value.signResponse,
331
355
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
332
356
  'default_relay_state': value.defaultRelayState,
333
357
  };
@@ -128,6 +128,24 @@ export interface SAMLProviderRequest {
128
128
  * @memberof SAMLProviderRequest
129
129
  */
130
130
  verificationKp?: string | null;
131
+ /**
132
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
133
+ * @type {string}
134
+ * @memberof SAMLProviderRequest
135
+ */
136
+ encryptionKp?: string | null;
137
+ /**
138
+ *
139
+ * @type {boolean}
140
+ * @memberof SAMLProviderRequest
141
+ */
142
+ signAssertion?: boolean;
143
+ /**
144
+ *
145
+ * @type {boolean}
146
+ * @memberof SAMLProviderRequest
147
+ */
148
+ signResponse?: boolean;
131
149
  /**
132
150
  *
133
151
  * @type {SpBindingEnum}
@@ -179,6 +197,9 @@ export function SAMLProviderRequestFromJSONTyped(json: any, ignoreDiscriminator:
179
197
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
180
198
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
181
199
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
200
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
201
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
202
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
182
203
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
183
204
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
184
205
  };
@@ -208,6 +229,9 @@ export function SAMLProviderRequestToJSON(value?: SAMLProviderRequest | null): a
208
229
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
209
230
  'signing_kp': value.signingKp,
210
231
  'verification_kp': value.verificationKp,
232
+ 'encryption_kp': value.encryptionKp,
233
+ 'sign_assertion': value.signAssertion,
234
+ 'sign_response': value.signResponse,
211
235
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
212
236
  'default_relay_state': value.defaultRelayState,
213
237
  };