@goauthentik/api 2024.6.3-1723645891 → 2024.6.3-1723921843

Sign up to get free protection for your applications and to get access to all the features.
@@ -380,6 +380,7 @@ export interface ProvidersSamlListRequest {
380
380
  backchannelApplication?: string;
381
381
  defaultRelayState?: string;
382
382
  digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
383
+ encryptionKp?: string;
383
384
  isBackchannel?: boolean;
384
385
  issuer?: string;
385
386
  name?: string;
@@ -390,6 +391,8 @@ export interface ProvidersSamlListRequest {
390
391
  propertyMappings?: Array<string>;
391
392
  search?: string;
392
393
  sessionValidNotOnOrAfter?: string;
394
+ signAssertion?: boolean;
395
+ signResponse?: boolean;
393
396
  signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
394
397
  signingKp?: string;
395
398
  spBinding?: ProvidersSamlListSpBindingEnum;
@@ -3293,6 +3293,9 @@ class ProvidersApi extends runtime.BaseAPI {
3293
3293
  if (requestParameters.digestAlgorithm !== undefined) {
3294
3294
  queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
3295
3295
  }
3296
+ if (requestParameters.encryptionKp !== undefined) {
3297
+ queryParameters['encryption_kp'] = requestParameters.encryptionKp;
3298
+ }
3296
3299
  if (requestParameters.isBackchannel !== undefined) {
3297
3300
  queryParameters['is_backchannel'] = requestParameters.isBackchannel;
3298
3301
  }
@@ -3323,6 +3326,12 @@ class ProvidersApi extends runtime.BaseAPI {
3323
3326
  if (requestParameters.sessionValidNotOnOrAfter !== undefined) {
3324
3327
  queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
3325
3328
  }
3329
+ if (requestParameters.signAssertion !== undefined) {
3330
+ queryParameters['sign_assertion'] = requestParameters.signAssertion;
3331
+ }
3332
+ if (requestParameters.signResponse !== undefined) {
3333
+ queryParameters['sign_response'] = requestParameters.signResponse;
3334
+ }
3326
3335
  if (requestParameters.signatureAlgorithm !== undefined) {
3327
3336
  queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
3328
3337
  }
@@ -380,6 +380,7 @@ export interface ProvidersSamlListRequest {
380
380
  backchannelApplication?: string;
381
381
  defaultRelayState?: string;
382
382
  digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
383
+ encryptionKp?: string;
383
384
  isBackchannel?: boolean;
384
385
  issuer?: string;
385
386
  name?: string;
@@ -390,6 +391,8 @@ export interface ProvidersSamlListRequest {
390
391
  propertyMappings?: Array<string>;
391
392
  search?: string;
392
393
  sessionValidNotOnOrAfter?: string;
394
+ signAssertion?: boolean;
395
+ signResponse?: boolean;
393
396
  signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
394
397
  signingKp?: string;
395
398
  spBinding?: ProvidersSamlListSpBindingEnum;
@@ -3290,6 +3290,9 @@ export class ProvidersApi extends runtime.BaseAPI {
3290
3290
  if (requestParameters.digestAlgorithm !== undefined) {
3291
3291
  queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
3292
3292
  }
3293
+ if (requestParameters.encryptionKp !== undefined) {
3294
+ queryParameters['encryption_kp'] = requestParameters.encryptionKp;
3295
+ }
3293
3296
  if (requestParameters.isBackchannel !== undefined) {
3294
3297
  queryParameters['is_backchannel'] = requestParameters.isBackchannel;
3295
3298
  }
@@ -3320,6 +3323,12 @@ export class ProvidersApi extends runtime.BaseAPI {
3320
3323
  if (requestParameters.sessionValidNotOnOrAfter !== undefined) {
3321
3324
  queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
3322
3325
  }
3326
+ if (requestParameters.signAssertion !== undefined) {
3327
+ queryParameters['sign_assertion'] = requestParameters.signAssertion;
3328
+ }
3329
+ if (requestParameters.signResponse !== undefined) {
3330
+ queryParameters['sign_response'] = requestParameters.signResponse;
3331
+ }
3323
3332
  if (requestParameters.signatureAlgorithm !== undefined) {
3324
3333
  queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
3325
3334
  }
@@ -108,6 +108,24 @@ export interface PatchedSAMLProviderRequest {
108
108
  * @memberof PatchedSAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof PatchedSAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof PatchedSAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof PatchedSAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}
@@ -45,6 +45,9 @@ export function PatchedSAMLProviderRequestFromJSONTyped(json, ignoreDiscriminato
45
45
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
46
46
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
47
47
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
48
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
49
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
50
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
48
51
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
49
52
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
50
53
  };
@@ -72,6 +75,9 @@ export function PatchedSAMLProviderRequestToJSON(value) {
72
75
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
73
76
  'signing_kp': value.signingKp,
74
77
  'verification_kp': value.verificationKp,
78
+ 'encryption_kp': value.encryptionKp,
79
+ 'sign_assertion': value.signAssertion,
80
+ 'sign_response': value.signResponse,
75
81
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
76
82
  'default_relay_state': value.defaultRelayState,
77
83
  };
@@ -162,6 +162,24 @@ export interface SAMLProvider {
162
162
  * @memberof SAMLProvider
163
163
  */
164
164
  verificationKp?: string | null;
165
+ /**
166
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
167
+ * @type {string}
168
+ * @memberof SAMLProvider
169
+ */
170
+ encryptionKp?: string | null;
171
+ /**
172
+ *
173
+ * @type {boolean}
174
+ * @memberof SAMLProvider
175
+ */
176
+ signAssertion?: boolean;
177
+ /**
178
+ *
179
+ * @type {boolean}
180
+ * @memberof SAMLProvider
181
+ */
182
+ signResponse?: boolean;
165
183
  /**
166
184
  *
167
185
  * @type {SpBindingEnum}
@@ -72,6 +72,9 @@ export function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
72
72
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
73
73
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
74
74
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
75
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
76
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
77
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
75
78
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
76
79
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
77
80
  'urlDownloadMetadata': json['url_download_metadata'],
@@ -105,6 +108,9 @@ export function SAMLProviderToJSON(value) {
105
108
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
106
109
  'signing_kp': value.signingKp,
107
110
  'verification_kp': value.verificationKp,
111
+ 'encryption_kp': value.encryptionKp,
112
+ 'sign_assertion': value.signAssertion,
113
+ 'sign_response': value.signResponse,
108
114
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
109
115
  'default_relay_state': value.defaultRelayState,
110
116
  };
@@ -108,6 +108,24 @@ export interface SAMLProviderRequest {
108
108
  * @memberof SAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof SAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof SAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof SAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}
@@ -48,6 +48,9 @@ export function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
48
48
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
49
49
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
50
50
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
51
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
52
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
53
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
51
54
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
52
55
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
53
56
  };
@@ -75,6 +78,9 @@ export function SAMLProviderRequestToJSON(value) {
75
78
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
76
79
  'signing_kp': value.signingKp,
77
80
  'verification_kp': value.verificationKp,
81
+ 'encryption_kp': value.encryptionKp,
82
+ 'sign_assertion': value.signAssertion,
83
+ 'sign_response': value.signResponse,
78
84
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
79
85
  'default_relay_state': value.defaultRelayState,
80
86
  };
@@ -108,6 +108,24 @@ export interface PatchedSAMLProviderRequest {
108
108
  * @memberof PatchedSAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof PatchedSAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof PatchedSAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof PatchedSAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}
@@ -50,6 +50,9 @@ function PatchedSAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
50
50
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
51
51
  'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
52
52
  'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
53
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
54
+ 'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
55
+ 'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
53
56
  'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
54
57
  'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
55
58
  };
@@ -78,6 +81,9 @@ function PatchedSAMLProviderRequestToJSON(value) {
78
81
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
79
82
  'signing_kp': value.signingKp,
80
83
  'verification_kp': value.verificationKp,
84
+ 'encryption_kp': value.encryptionKp,
85
+ 'sign_assertion': value.signAssertion,
86
+ 'sign_response': value.signResponse,
81
87
  'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
82
88
  'default_relay_state': value.defaultRelayState,
83
89
  };
@@ -162,6 +162,24 @@ export interface SAMLProvider {
162
162
  * @memberof SAMLProvider
163
163
  */
164
164
  verificationKp?: string | null;
165
+ /**
166
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
167
+ * @type {string}
168
+ * @memberof SAMLProvider
169
+ */
170
+ encryptionKp?: string | null;
171
+ /**
172
+ *
173
+ * @type {boolean}
174
+ * @memberof SAMLProvider
175
+ */
176
+ signAssertion?: boolean;
177
+ /**
178
+ *
179
+ * @type {boolean}
180
+ * @memberof SAMLProvider
181
+ */
182
+ signResponse?: boolean;
165
183
  /**
166
184
  *
167
185
  * @type {SpBindingEnum}
@@ -77,6 +77,9 @@ function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
77
77
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
78
78
  'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
79
79
  'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
80
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
81
+ 'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
82
+ 'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
80
83
  'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
81
84
  'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
82
85
  'urlDownloadMetadata': json['url_download_metadata'],
@@ -111,6 +114,9 @@ function SAMLProviderToJSON(value) {
111
114
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
112
115
  'signing_kp': value.signingKp,
113
116
  'verification_kp': value.verificationKp,
117
+ 'encryption_kp': value.encryptionKp,
118
+ 'sign_assertion': value.signAssertion,
119
+ 'sign_response': value.signResponse,
114
120
  'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
115
121
  'default_relay_state': value.defaultRelayState,
116
122
  };
@@ -108,6 +108,24 @@ export interface SAMLProviderRequest {
108
108
  * @memberof SAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof SAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof SAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof SAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}
@@ -53,6 +53,9 @@ function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
53
53
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
54
54
  'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
55
55
  'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
56
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
57
+ 'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
58
+ 'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
56
59
  'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
57
60
  'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
58
61
  };
@@ -81,6 +84,9 @@ function SAMLProviderRequestToJSON(value) {
81
84
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
82
85
  'signing_kp': value.signingKp,
83
86
  'verification_kp': value.verificationKp,
87
+ 'encryption_kp': value.encryptionKp,
88
+ 'sign_assertion': value.signAssertion,
89
+ 'sign_response': value.signResponse,
84
90
  'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
85
91
  'default_relay_state': value.defaultRelayState,
86
92
  };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2024.6.3-1723645891",
3
+ "version": "2024.6.3-1723921843",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -660,6 +660,7 @@ export interface ProvidersSamlListRequest {
660
660
  backchannelApplication?: string;
661
661
  defaultRelayState?: string;
662
662
  digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
663
+ encryptionKp?: string;
663
664
  isBackchannel?: boolean;
664
665
  issuer?: string;
665
666
  name?: string;
@@ -670,6 +671,8 @@ export interface ProvidersSamlListRequest {
670
671
  propertyMappings?: Array<string>;
671
672
  search?: string;
672
673
  sessionValidNotOnOrAfter?: string;
674
+ signAssertion?: boolean;
675
+ signResponse?: boolean;
673
676
  signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
674
677
  signingKp?: string;
675
678
  spBinding?: ProvidersSamlListSpBindingEnum;
@@ -4460,6 +4463,10 @@ export class ProvidersApi extends runtime.BaseAPI {
4460
4463
  queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
4461
4464
  }
4462
4465
 
4466
+ if (requestParameters.encryptionKp !== undefined) {
4467
+ queryParameters['encryption_kp'] = requestParameters.encryptionKp;
4468
+ }
4469
+
4463
4470
  if (requestParameters.isBackchannel !== undefined) {
4464
4471
  queryParameters['is_backchannel'] = requestParameters.isBackchannel;
4465
4472
  }
@@ -4500,6 +4507,14 @@ export class ProvidersApi extends runtime.BaseAPI {
4500
4507
  queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
4501
4508
  }
4502
4509
 
4510
+ if (requestParameters.signAssertion !== undefined) {
4511
+ queryParameters['sign_assertion'] = requestParameters.signAssertion;
4512
+ }
4513
+
4514
+ if (requestParameters.signResponse !== undefined) {
4515
+ queryParameters['sign_response'] = requestParameters.signResponse;
4516
+ }
4517
+
4503
4518
  if (requestParameters.signatureAlgorithm !== undefined) {
4504
4519
  queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
4505
4520
  }
@@ -128,6 +128,24 @@ export interface PatchedSAMLProviderRequest {
128
128
  * @memberof PatchedSAMLProviderRequest
129
129
  */
130
130
  verificationKp?: string | null;
131
+ /**
132
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
133
+ * @type {string}
134
+ * @memberof PatchedSAMLProviderRequest
135
+ */
136
+ encryptionKp?: string | null;
137
+ /**
138
+ *
139
+ * @type {boolean}
140
+ * @memberof PatchedSAMLProviderRequest
141
+ */
142
+ signAssertion?: boolean;
143
+ /**
144
+ *
145
+ * @type {boolean}
146
+ * @memberof PatchedSAMLProviderRequest
147
+ */
148
+ signResponse?: boolean;
131
149
  /**
132
150
  *
133
151
  * @type {SpBindingEnum}
@@ -176,6 +194,9 @@ export function PatchedSAMLProviderRequestFromJSONTyped(json: any, ignoreDiscrim
176
194
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
177
195
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
178
196
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
197
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
198
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
199
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
179
200
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
180
201
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
181
202
  };
@@ -205,6 +226,9 @@ export function PatchedSAMLProviderRequestToJSON(value?: PatchedSAMLProviderRequ
205
226
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
206
227
  'signing_kp': value.signingKp,
207
228
  'verification_kp': value.verificationKp,
229
+ 'encryption_kp': value.encryptionKp,
230
+ 'sign_assertion': value.signAssertion,
231
+ 'sign_response': value.signResponse,
208
232
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
209
233
  'default_relay_state': value.defaultRelayState,
210
234
  };
@@ -182,6 +182,24 @@ export interface SAMLProvider {
182
182
  * @memberof SAMLProvider
183
183
  */
184
184
  verificationKp?: string | null;
185
+ /**
186
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
187
+ * @type {string}
188
+ * @memberof SAMLProvider
189
+ */
190
+ encryptionKp?: string | null;
191
+ /**
192
+ *
193
+ * @type {boolean}
194
+ * @memberof SAMLProvider
195
+ */
196
+ signAssertion?: boolean;
197
+ /**
198
+ *
199
+ * @type {boolean}
200
+ * @memberof SAMLProvider
201
+ */
202
+ signResponse?: boolean;
185
203
  /**
186
204
  *
187
205
  * @type {SpBindingEnum}
@@ -293,6 +311,9 @@ export function SAMLProviderFromJSONTyped(json: any, ignoreDiscriminator: boolea
293
311
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
294
312
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
295
313
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
314
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
315
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
316
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
296
317
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
297
318
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
298
319
  'urlDownloadMetadata': json['url_download_metadata'],
@@ -328,6 +349,9 @@ export function SAMLProviderToJSON(value?: SAMLProvider | null): any {
328
349
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
329
350
  'signing_kp': value.signingKp,
330
351
  'verification_kp': value.verificationKp,
352
+ 'encryption_kp': value.encryptionKp,
353
+ 'sign_assertion': value.signAssertion,
354
+ 'sign_response': value.signResponse,
331
355
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
332
356
  'default_relay_state': value.defaultRelayState,
333
357
  };
@@ -128,6 +128,24 @@ export interface SAMLProviderRequest {
128
128
  * @memberof SAMLProviderRequest
129
129
  */
130
130
  verificationKp?: string | null;
131
+ /**
132
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
133
+ * @type {string}
134
+ * @memberof SAMLProviderRequest
135
+ */
136
+ encryptionKp?: string | null;
137
+ /**
138
+ *
139
+ * @type {boolean}
140
+ * @memberof SAMLProviderRequest
141
+ */
142
+ signAssertion?: boolean;
143
+ /**
144
+ *
145
+ * @type {boolean}
146
+ * @memberof SAMLProviderRequest
147
+ */
148
+ signResponse?: boolean;
131
149
  /**
132
150
  *
133
151
  * @type {SpBindingEnum}
@@ -179,6 +197,9 @@ export function SAMLProviderRequestFromJSONTyped(json: any, ignoreDiscriminator:
179
197
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
180
198
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
181
199
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
200
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
201
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
202
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
182
203
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
183
204
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
184
205
  };
@@ -208,6 +229,9 @@ export function SAMLProviderRequestToJSON(value?: SAMLProviderRequest | null): a
208
229
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
209
230
  'signing_kp': value.signingKp,
210
231
  'verification_kp': value.verificationKp,
232
+ 'encryption_kp': value.encryptionKp,
233
+ 'sign_assertion': value.signAssertion,
234
+ 'sign_response': value.signResponse,
211
235
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
212
236
  'default_relay_state': value.defaultRelayState,
213
237
  };