@goauthentik/api 2024.8.3-1728939481 → 2024.8.3-1729166675
Sign up to get free protection for your applications and to get access to all the features.
- package/dist/esm/models/OAuth2Provider.d.ts +7 -1
- package/dist/esm/models/OAuth2Provider.js +2 -0
- package/dist/esm/models/OAuth2ProviderRequest.d.ts +7 -1
- package/dist/esm/models/OAuth2ProviderRequest.js +2 -0
- package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts +7 -1
- package/dist/esm/models/PatchedOAuth2ProviderRequest.js +2 -0
- package/dist/models/OAuth2Provider.d.ts +7 -1
- package/dist/models/OAuth2Provider.js +2 -0
- package/dist/models/OAuth2ProviderRequest.d.ts +7 -1
- package/dist/models/OAuth2ProviderRequest.js +2 -0
- package/dist/models/PatchedOAuth2ProviderRequest.d.ts +7 -1
- package/dist/models/PatchedOAuth2ProviderRequest.js +2 -0
- package/package.json +1 -1
- package/src/models/OAuth2Provider.ts +9 -1
- package/src/models/OAuth2ProviderRequest.ts +9 -1
- package/src/models/PatchedOAuth2ProviderRequest.ts +9 -1
@@ -145,11 +145,17 @@ export interface OAuth2Provider {
|
|
145
145
|
*/
|
146
146
|
includeClaimsInIdToken?: boolean;
|
147
147
|
/**
|
148
|
-
* Key used to sign the tokens.
|
148
|
+
* Key used to sign the tokens.
|
149
149
|
* @type {string}
|
150
150
|
* @memberof OAuth2Provider
|
151
151
|
*/
|
152
152
|
signingKey?: string | null;
|
153
|
+
/**
|
154
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
155
|
+
* @type {string}
|
156
|
+
* @memberof OAuth2Provider
|
157
|
+
*/
|
158
|
+
encryptionKey?: string | null;
|
153
159
|
/**
|
154
160
|
* Enter each URI on a new line.
|
155
161
|
* @type {string}
|
@@ -64,6 +64,7 @@ export function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
64
64
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
65
65
|
'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
66
66
|
'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
|
67
|
+
'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
|
67
68
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
68
69
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
69
70
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
@@ -91,6 +92,7 @@ export function OAuth2ProviderToJSON(value) {
|
|
91
92
|
'refresh_token_validity': value.refreshTokenValidity,
|
92
93
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
93
94
|
'signing_key': value.signingKey,
|
95
|
+
'encryption_key': value.encryptionKey,
|
94
96
|
'redirect_uris': value.redirectUris,
|
95
97
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
96
98
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
@@ -91,11 +91,17 @@ export interface OAuth2ProviderRequest {
|
|
91
91
|
*/
|
92
92
|
includeClaimsInIdToken?: boolean;
|
93
93
|
/**
|
94
|
-
* Key used to sign the tokens.
|
94
|
+
* Key used to sign the tokens.
|
95
95
|
* @type {string}
|
96
96
|
* @memberof OAuth2ProviderRequest
|
97
97
|
*/
|
98
98
|
signingKey?: string | null;
|
99
|
+
/**
|
100
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
101
|
+
* @type {string}
|
102
|
+
* @memberof OAuth2ProviderRequest
|
103
|
+
*/
|
104
|
+
encryptionKey?: string | null;
|
99
105
|
/**
|
100
106
|
* Enter each URI on a new line.
|
101
107
|
* @type {string}
|
@@ -46,6 +46,7 @@ export function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
46
46
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
47
47
|
'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
48
48
|
'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
|
49
|
+
'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
|
49
50
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
50
51
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
51
52
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
@@ -73,6 +74,7 @@ export function OAuth2ProviderRequestToJSON(value) {
|
|
73
74
|
'refresh_token_validity': value.refreshTokenValidity,
|
74
75
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
75
76
|
'signing_key': value.signingKey,
|
77
|
+
'encryption_key': value.encryptionKey,
|
76
78
|
'redirect_uris': value.redirectUris,
|
77
79
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
78
80
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
@@ -91,11 +91,17 @@ export interface PatchedOAuth2ProviderRequest {
|
|
91
91
|
*/
|
92
92
|
includeClaimsInIdToken?: boolean;
|
93
93
|
/**
|
94
|
-
* Key used to sign the tokens.
|
94
|
+
* Key used to sign the tokens.
|
95
95
|
* @type {string}
|
96
96
|
* @memberof PatchedOAuth2ProviderRequest
|
97
97
|
*/
|
98
98
|
signingKey?: string | null;
|
99
|
+
/**
|
100
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
101
|
+
* @type {string}
|
102
|
+
* @memberof PatchedOAuth2ProviderRequest
|
103
|
+
*/
|
104
|
+
encryptionKey?: string | null;
|
99
105
|
/**
|
100
106
|
* Enter each URI on a new line.
|
101
107
|
* @type {string}
|
@@ -43,6 +43,7 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscrimina
|
|
43
43
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
44
44
|
'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
45
45
|
'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
|
46
|
+
'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
|
46
47
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
47
48
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
48
49
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
@@ -70,6 +71,7 @@ export function PatchedOAuth2ProviderRequestToJSON(value) {
|
|
70
71
|
'refresh_token_validity': value.refreshTokenValidity,
|
71
72
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
72
73
|
'signing_key': value.signingKey,
|
74
|
+
'encryption_key': value.encryptionKey,
|
73
75
|
'redirect_uris': value.redirectUris,
|
74
76
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
75
77
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
@@ -145,11 +145,17 @@ export interface OAuth2Provider {
|
|
145
145
|
*/
|
146
146
|
includeClaimsInIdToken?: boolean;
|
147
147
|
/**
|
148
|
-
* Key used to sign the tokens.
|
148
|
+
* Key used to sign the tokens.
|
149
149
|
* @type {string}
|
150
150
|
* @memberof OAuth2Provider
|
151
151
|
*/
|
152
152
|
signingKey?: string | null;
|
153
|
+
/**
|
154
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
155
|
+
* @type {string}
|
156
|
+
* @memberof OAuth2Provider
|
157
|
+
*/
|
158
|
+
encryptionKey?: string | null;
|
153
159
|
/**
|
154
160
|
* Enter each URI on a new line.
|
155
161
|
* @type {string}
|
@@ -69,6 +69,7 @@ function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
69
69
|
'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
70
70
|
'includeClaimsInIdToken': !(0, runtime_1.exists)(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
71
71
|
'signingKey': !(0, runtime_1.exists)(json, 'signing_key') ? undefined : json['signing_key'],
|
72
|
+
'encryptionKey': !(0, runtime_1.exists)(json, 'encryption_key') ? undefined : json['encryption_key'],
|
72
73
|
'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
73
74
|
'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
|
74
75
|
'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
|
@@ -97,6 +98,7 @@ function OAuth2ProviderToJSON(value) {
|
|
97
98
|
'refresh_token_validity': value.refreshTokenValidity,
|
98
99
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
99
100
|
'signing_key': value.signingKey,
|
101
|
+
'encryption_key': value.encryptionKey,
|
100
102
|
'redirect_uris': value.redirectUris,
|
101
103
|
'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
|
102
104
|
'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
|
@@ -91,11 +91,17 @@ export interface OAuth2ProviderRequest {
|
|
91
91
|
*/
|
92
92
|
includeClaimsInIdToken?: boolean;
|
93
93
|
/**
|
94
|
-
* Key used to sign the tokens.
|
94
|
+
* Key used to sign the tokens.
|
95
95
|
* @type {string}
|
96
96
|
* @memberof OAuth2ProviderRequest
|
97
97
|
*/
|
98
98
|
signingKey?: string | null;
|
99
|
+
/**
|
100
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
101
|
+
* @type {string}
|
102
|
+
* @memberof OAuth2ProviderRequest
|
103
|
+
*/
|
104
|
+
encryptionKey?: string | null;
|
99
105
|
/**
|
100
106
|
* Enter each URI on a new line.
|
101
107
|
* @type {string}
|
@@ -51,6 +51,7 @@ function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
51
51
|
'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
52
52
|
'includeClaimsInIdToken': !(0, runtime_1.exists)(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
53
53
|
'signingKey': !(0, runtime_1.exists)(json, 'signing_key') ? undefined : json['signing_key'],
|
54
|
+
'encryptionKey': !(0, runtime_1.exists)(json, 'encryption_key') ? undefined : json['encryption_key'],
|
54
55
|
'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
55
56
|
'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
|
56
57
|
'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
|
@@ -79,6 +80,7 @@ function OAuth2ProviderRequestToJSON(value) {
|
|
79
80
|
'refresh_token_validity': value.refreshTokenValidity,
|
80
81
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
81
82
|
'signing_key': value.signingKey,
|
83
|
+
'encryption_key': value.encryptionKey,
|
82
84
|
'redirect_uris': value.redirectUris,
|
83
85
|
'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
|
84
86
|
'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
|
@@ -91,11 +91,17 @@ export interface PatchedOAuth2ProviderRequest {
|
|
91
91
|
*/
|
92
92
|
includeClaimsInIdToken?: boolean;
|
93
93
|
/**
|
94
|
-
* Key used to sign the tokens.
|
94
|
+
* Key used to sign the tokens.
|
95
95
|
* @type {string}
|
96
96
|
* @memberof PatchedOAuth2ProviderRequest
|
97
97
|
*/
|
98
98
|
signingKey?: string | null;
|
99
|
+
/**
|
100
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
101
|
+
* @type {string}
|
102
|
+
* @memberof PatchedOAuth2ProviderRequest
|
103
|
+
*/
|
104
|
+
encryptionKey?: string | null;
|
99
105
|
/**
|
100
106
|
* Enter each URI on a new line.
|
101
107
|
* @type {string}
|
@@ -48,6 +48,7 @@ function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
48
48
|
'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
49
49
|
'includeClaimsInIdToken': !(0, runtime_1.exists)(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
50
50
|
'signingKey': !(0, runtime_1.exists)(json, 'signing_key') ? undefined : json['signing_key'],
|
51
|
+
'encryptionKey': !(0, runtime_1.exists)(json, 'encryption_key') ? undefined : json['encryption_key'],
|
51
52
|
'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
52
53
|
'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
|
53
54
|
'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
|
@@ -76,6 +77,7 @@ function PatchedOAuth2ProviderRequestToJSON(value) {
|
|
76
77
|
'refresh_token_validity': value.refreshTokenValidity,
|
77
78
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
78
79
|
'signing_key': value.signingKey,
|
80
|
+
'encryption_key': value.encryptionKey,
|
79
81
|
'redirect_uris': value.redirectUris,
|
80
82
|
'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
|
81
83
|
'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
|
package/package.json
CHANGED
@@ -165,11 +165,17 @@ export interface OAuth2Provider {
|
|
165
165
|
*/
|
166
166
|
includeClaimsInIdToken?: boolean;
|
167
167
|
/**
|
168
|
-
* Key used to sign the tokens.
|
168
|
+
* Key used to sign the tokens.
|
169
169
|
* @type {string}
|
170
170
|
* @memberof OAuth2Provider
|
171
171
|
*/
|
172
172
|
signingKey?: string | null;
|
173
|
+
/**
|
174
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
175
|
+
* @type {string}
|
176
|
+
* @memberof OAuth2Provider
|
177
|
+
*/
|
178
|
+
encryptionKey?: string | null;
|
173
179
|
/**
|
174
180
|
* Enter each URI on a new line.
|
175
181
|
* @type {string}
|
@@ -249,6 +255,7 @@ export function OAuth2ProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
|
|
249
255
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
250
256
|
'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
251
257
|
'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
|
258
|
+
'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
|
252
259
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
253
260
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
254
261
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
@@ -278,6 +285,7 @@ export function OAuth2ProviderToJSON(value?: OAuth2Provider | null): any {
|
|
278
285
|
'refresh_token_validity': value.refreshTokenValidity,
|
279
286
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
280
287
|
'signing_key': value.signingKey,
|
288
|
+
'encryption_key': value.encryptionKey,
|
281
289
|
'redirect_uris': value.redirectUris,
|
282
290
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
283
291
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
@@ -111,11 +111,17 @@ export interface OAuth2ProviderRequest {
|
|
111
111
|
*/
|
112
112
|
includeClaimsInIdToken?: boolean;
|
113
113
|
/**
|
114
|
-
* Key used to sign the tokens.
|
114
|
+
* Key used to sign the tokens.
|
115
115
|
* @type {string}
|
116
116
|
* @memberof OAuth2ProviderRequest
|
117
117
|
*/
|
118
118
|
signingKey?: string | null;
|
119
|
+
/**
|
120
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
121
|
+
* @type {string}
|
122
|
+
* @memberof OAuth2ProviderRequest
|
123
|
+
*/
|
124
|
+
encryptionKey?: string | null;
|
119
125
|
/**
|
120
126
|
* Enter each URI on a new line.
|
121
127
|
* @type {string}
|
@@ -177,6 +183,7 @@ export function OAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
|
|
177
183
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
178
184
|
'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
179
185
|
'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
|
186
|
+
'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
|
180
187
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
181
188
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
182
189
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
@@ -206,6 +213,7 @@ export function OAuth2ProviderRequestToJSON(value?: OAuth2ProviderRequest | null
|
|
206
213
|
'refresh_token_validity': value.refreshTokenValidity,
|
207
214
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
208
215
|
'signing_key': value.signingKey,
|
216
|
+
'encryption_key': value.encryptionKey,
|
209
217
|
'redirect_uris': value.redirectUris,
|
210
218
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
211
219
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|
@@ -111,11 +111,17 @@ export interface PatchedOAuth2ProviderRequest {
|
|
111
111
|
*/
|
112
112
|
includeClaimsInIdToken?: boolean;
|
113
113
|
/**
|
114
|
-
* Key used to sign the tokens.
|
114
|
+
* Key used to sign the tokens.
|
115
115
|
* @type {string}
|
116
116
|
* @memberof PatchedOAuth2ProviderRequest
|
117
117
|
*/
|
118
118
|
signingKey?: string | null;
|
119
|
+
/**
|
120
|
+
* Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
|
121
|
+
* @type {string}
|
122
|
+
* @memberof PatchedOAuth2ProviderRequest
|
123
|
+
*/
|
124
|
+
encryptionKey?: string | null;
|
119
125
|
/**
|
120
126
|
* Enter each URI on a new line.
|
121
127
|
* @type {string}
|
@@ -174,6 +180,7 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscr
|
|
174
180
|
'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
|
175
181
|
'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
|
176
182
|
'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
|
183
|
+
'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
|
177
184
|
'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
|
178
185
|
'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
179
186
|
'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
@@ -203,6 +210,7 @@ export function PatchedOAuth2ProviderRequestToJSON(value?: PatchedOAuth2Provider
|
|
203
210
|
'refresh_token_validity': value.refreshTokenValidity,
|
204
211
|
'include_claims_in_id_token': value.includeClaimsInIdToken,
|
205
212
|
'signing_key': value.signingKey,
|
213
|
+
'encryption_key': value.encryptionKey,
|
206
214
|
'redirect_uris': value.redirectUris,
|
207
215
|
'sub_mode': SubModeEnumToJSON(value.subMode),
|
208
216
|
'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
|