@goauthentik/api 2025.2.4-1744808430 → 2025.2.4-1745325566

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (67) hide show
  1. package/.openapi-generator/FILES +4 -0
  2. package/dist/apis/PoliciesApi.d.ts +90 -1
  3. package/dist/apis/PoliciesApi.js +283 -0
  4. package/dist/apis/RbacApi.d.ts +2 -0
  5. package/dist/apis/RbacApi.js +2 -0
  6. package/dist/esm/apis/PoliciesApi.d.ts +90 -1
  7. package/dist/esm/apis/PoliciesApi.js +284 -1
  8. package/dist/esm/apis/RbacApi.d.ts +2 -0
  9. package/dist/esm/apis/RbacApi.js +2 -0
  10. package/dist/esm/models/AppEnum.d.ts +1 -0
  11. package/dist/esm/models/AppEnum.js +1 -0
  12. package/dist/esm/models/IdentificationChallenge.d.ts +6 -0
  13. package/dist/esm/models/IdentificationChallenge.js +2 -0
  14. package/dist/esm/models/IdentificationStage.d.ts +6 -0
  15. package/dist/esm/models/IdentificationStage.js +2 -0
  16. package/dist/esm/models/IdentificationStageRequest.d.ts +6 -0
  17. package/dist/esm/models/IdentificationStageRequest.js +2 -0
  18. package/dist/esm/models/ModelEnum.d.ts +1 -0
  19. package/dist/esm/models/ModelEnum.js +1 -0
  20. package/dist/esm/models/PaginatedUniquePasswordPolicyList.d.ts +40 -0
  21. package/dist/esm/models/PaginatedUniquePasswordPolicyList.js +49 -0
  22. package/dist/esm/models/PatchedIdentificationStageRequest.d.ts +6 -0
  23. package/dist/esm/models/PatchedIdentificationStageRequest.js +2 -0
  24. package/dist/esm/models/PatchedUniquePasswordPolicyRequest.d.ts +50 -0
  25. package/dist/esm/models/PatchedUniquePasswordPolicyRequest.js +47 -0
  26. package/dist/esm/models/UniquePasswordPolicy.d.ts +86 -0
  27. package/dist/esm/models/UniquePasswordPolicy.js +67 -0
  28. package/dist/esm/models/UniquePasswordPolicyRequest.d.ts +50 -0
  29. package/dist/esm/models/UniquePasswordPolicyRequest.js +49 -0
  30. package/dist/esm/models/index.d.ts +4 -0
  31. package/dist/esm/models/index.js +4 -0
  32. package/dist/models/AppEnum.d.ts +1 -0
  33. package/dist/models/AppEnum.js +1 -0
  34. package/dist/models/IdentificationChallenge.d.ts +6 -0
  35. package/dist/models/IdentificationChallenge.js +2 -0
  36. package/dist/models/IdentificationStage.d.ts +6 -0
  37. package/dist/models/IdentificationStage.js +2 -0
  38. package/dist/models/IdentificationStageRequest.d.ts +6 -0
  39. package/dist/models/IdentificationStageRequest.js +2 -0
  40. package/dist/models/ModelEnum.d.ts +1 -0
  41. package/dist/models/ModelEnum.js +1 -0
  42. package/dist/models/PaginatedUniquePasswordPolicyList.d.ts +40 -0
  43. package/dist/models/PaginatedUniquePasswordPolicyList.js +56 -0
  44. package/dist/models/PatchedIdentificationStageRequest.d.ts +6 -0
  45. package/dist/models/PatchedIdentificationStageRequest.js +2 -0
  46. package/dist/models/PatchedUniquePasswordPolicyRequest.d.ts +50 -0
  47. package/dist/models/PatchedUniquePasswordPolicyRequest.js +54 -0
  48. package/dist/models/UniquePasswordPolicy.d.ts +86 -0
  49. package/dist/models/UniquePasswordPolicy.js +74 -0
  50. package/dist/models/UniquePasswordPolicyRequest.d.ts +50 -0
  51. package/dist/models/UniquePasswordPolicyRequest.js +56 -0
  52. package/dist/models/index.d.ts +4 -0
  53. package/dist/models/index.js +4 -0
  54. package/package.json +1 -1
  55. package/src/apis/PoliciesApi.ts +391 -0
  56. package/src/apis/RbacApi.ts +2 -0
  57. package/src/models/AppEnum.ts +1 -0
  58. package/src/models/IdentificationChallenge.ts +8 -0
  59. package/src/models/IdentificationStage.ts +8 -0
  60. package/src/models/IdentificationStageRequest.ts +8 -0
  61. package/src/models/ModelEnum.ts +1 -0
  62. package/src/models/PaginatedUniquePasswordPolicyList.ts +90 -0
  63. package/src/models/PatchedIdentificationStageRequest.ts +8 -0
  64. package/src/models/PatchedUniquePasswordPolicyRequest.ts +89 -0
  65. package/src/models/UniquePasswordPolicy.ts +138 -0
  66. package/src/models/UniquePasswordPolicyRequest.ts +90 -0
  67. package/src/models/index.ts +4 -0
@@ -21,7 +21,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
21
21
  });
22
22
  };
23
23
  import * as runtime from '../runtime';
24
- import { CacheFromJSON, DetailedCountryFromJSON, DummyPolicyFromJSON, DummyPolicyRequestToJSON, EventMatcherPolicyFromJSON, EventMatcherPolicyRequestToJSON, ExpressionPolicyFromJSON, ExpressionPolicyRequestToJSON, GeoIPPolicyFromJSON, GeoIPPolicyRequestToJSON, PaginatedDummyPolicyListFromJSON, PaginatedEventMatcherPolicyListFromJSON, PaginatedExpressionPolicyListFromJSON, PaginatedGeoIPPolicyListFromJSON, PaginatedPasswordExpiryPolicyListFromJSON, PaginatedPasswordPolicyListFromJSON, PaginatedPolicyBindingListFromJSON, PaginatedPolicyListFromJSON, PaginatedReputationListFromJSON, PaginatedReputationPolicyListFromJSON, PasswordExpiryPolicyFromJSON, PasswordExpiryPolicyRequestToJSON, PasswordPolicyFromJSON, PasswordPolicyRequestToJSON, PatchedDummyPolicyRequestToJSON, PatchedEventMatcherPolicyRequestToJSON, PatchedExpressionPolicyRequestToJSON, PatchedGeoIPPolicyRequestToJSON, PatchedPasswordExpiryPolicyRequestToJSON, PatchedPasswordPolicyRequestToJSON, PatchedPolicyBindingRequestToJSON, PatchedReputationPolicyRequestToJSON, PolicyFromJSON, PolicyBindingFromJSON, PolicyBindingRequestToJSON, PolicyTestRequestToJSON, PolicyTestResultFromJSON, ReputationFromJSON, ReputationPolicyFromJSON, ReputationPolicyRequestToJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models/index';
24
+ import { CacheFromJSON, DetailedCountryFromJSON, DummyPolicyFromJSON, DummyPolicyRequestToJSON, EventMatcherPolicyFromJSON, EventMatcherPolicyRequestToJSON, ExpressionPolicyFromJSON, ExpressionPolicyRequestToJSON, GeoIPPolicyFromJSON, GeoIPPolicyRequestToJSON, PaginatedDummyPolicyListFromJSON, PaginatedEventMatcherPolicyListFromJSON, PaginatedExpressionPolicyListFromJSON, PaginatedGeoIPPolicyListFromJSON, PaginatedPasswordExpiryPolicyListFromJSON, PaginatedPasswordPolicyListFromJSON, PaginatedPolicyBindingListFromJSON, PaginatedPolicyListFromJSON, PaginatedReputationListFromJSON, PaginatedReputationPolicyListFromJSON, PaginatedUniquePasswordPolicyListFromJSON, PasswordExpiryPolicyFromJSON, PasswordExpiryPolicyRequestToJSON, PasswordPolicyFromJSON, PasswordPolicyRequestToJSON, PatchedDummyPolicyRequestToJSON, PatchedEventMatcherPolicyRequestToJSON, PatchedExpressionPolicyRequestToJSON, PatchedGeoIPPolicyRequestToJSON, PatchedPasswordExpiryPolicyRequestToJSON, PatchedPasswordPolicyRequestToJSON, PatchedPolicyBindingRequestToJSON, PatchedReputationPolicyRequestToJSON, PatchedUniquePasswordPolicyRequestToJSON, PolicyFromJSON, PolicyBindingFromJSON, PolicyBindingRequestToJSON, PolicyTestRequestToJSON, PolicyTestResultFromJSON, ReputationFromJSON, ReputationPolicyFromJSON, ReputationPolicyRequestToJSON, TypeCreateFromJSON, UniquePasswordPolicyFromJSON, UniquePasswordPolicyRequestToJSON, UsedByFromJSON, } from '../models/index';
25
25
  /**
26
26
  *
27
27
  */
@@ -2795,6 +2795,289 @@ export class PoliciesApi extends runtime.BaseAPI {
2795
2795
  return yield response.value();
2796
2796
  });
2797
2797
  }
2798
+ /**
2799
+ * Password Uniqueness Policy Viewset
2800
+ */
2801
+ policiesUniquePasswordCreateRaw(requestParameters, initOverrides) {
2802
+ return __awaiter(this, void 0, void 0, function* () {
2803
+ if (requestParameters['uniquePasswordPolicyRequest'] == null) {
2804
+ throw new runtime.RequiredError('uniquePasswordPolicyRequest', 'Required parameter "uniquePasswordPolicyRequest" was null or undefined when calling policiesUniquePasswordCreate().');
2805
+ }
2806
+ const queryParameters = {};
2807
+ const headerParameters = {};
2808
+ headerParameters['Content-Type'] = 'application/json';
2809
+ if (this.configuration && this.configuration.accessToken) {
2810
+ const token = this.configuration.accessToken;
2811
+ const tokenString = yield token("authentik", []);
2812
+ if (tokenString) {
2813
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
2814
+ }
2815
+ }
2816
+ const response = yield this.request({
2817
+ path: `/policies/unique_password/`,
2818
+ method: 'POST',
2819
+ headers: headerParameters,
2820
+ query: queryParameters,
2821
+ body: UniquePasswordPolicyRequestToJSON(requestParameters['uniquePasswordPolicyRequest']),
2822
+ }, initOverrides);
2823
+ return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
2824
+ });
2825
+ }
2826
+ /**
2827
+ * Password Uniqueness Policy Viewset
2828
+ */
2829
+ policiesUniquePasswordCreate(requestParameters, initOverrides) {
2830
+ return __awaiter(this, void 0, void 0, function* () {
2831
+ const response = yield this.policiesUniquePasswordCreateRaw(requestParameters, initOverrides);
2832
+ return yield response.value();
2833
+ });
2834
+ }
2835
+ /**
2836
+ * Password Uniqueness Policy Viewset
2837
+ */
2838
+ policiesUniquePasswordDestroyRaw(requestParameters, initOverrides) {
2839
+ return __awaiter(this, void 0, void 0, function* () {
2840
+ if (requestParameters['policyUuid'] == null) {
2841
+ throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordDestroy().');
2842
+ }
2843
+ const queryParameters = {};
2844
+ const headerParameters = {};
2845
+ if (this.configuration && this.configuration.accessToken) {
2846
+ const token = this.configuration.accessToken;
2847
+ const tokenString = yield token("authentik", []);
2848
+ if (tokenString) {
2849
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
2850
+ }
2851
+ }
2852
+ const response = yield this.request({
2853
+ path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
2854
+ method: 'DELETE',
2855
+ headers: headerParameters,
2856
+ query: queryParameters,
2857
+ }, initOverrides);
2858
+ return new runtime.VoidApiResponse(response);
2859
+ });
2860
+ }
2861
+ /**
2862
+ * Password Uniqueness Policy Viewset
2863
+ */
2864
+ policiesUniquePasswordDestroy(requestParameters, initOverrides) {
2865
+ return __awaiter(this, void 0, void 0, function* () {
2866
+ yield this.policiesUniquePasswordDestroyRaw(requestParameters, initOverrides);
2867
+ });
2868
+ }
2869
+ /**
2870
+ * Password Uniqueness Policy Viewset
2871
+ */
2872
+ policiesUniquePasswordListRaw(requestParameters, initOverrides) {
2873
+ return __awaiter(this, void 0, void 0, function* () {
2874
+ const queryParameters = {};
2875
+ if (requestParameters['created'] != null) {
2876
+ queryParameters['created'] = requestParameters['created'].toISOString();
2877
+ }
2878
+ if (requestParameters['executionLogging'] != null) {
2879
+ queryParameters['execution_logging'] = requestParameters['executionLogging'];
2880
+ }
2881
+ if (requestParameters['lastUpdated'] != null) {
2882
+ queryParameters['last_updated'] = requestParameters['lastUpdated'].toISOString();
2883
+ }
2884
+ if (requestParameters['name'] != null) {
2885
+ queryParameters['name'] = requestParameters['name'];
2886
+ }
2887
+ if (requestParameters['numHistoricalPasswords'] != null) {
2888
+ queryParameters['num_historical_passwords'] = requestParameters['numHistoricalPasswords'];
2889
+ }
2890
+ if (requestParameters['ordering'] != null) {
2891
+ queryParameters['ordering'] = requestParameters['ordering'];
2892
+ }
2893
+ if (requestParameters['page'] != null) {
2894
+ queryParameters['page'] = requestParameters['page'];
2895
+ }
2896
+ if (requestParameters['pageSize'] != null) {
2897
+ queryParameters['page_size'] = requestParameters['pageSize'];
2898
+ }
2899
+ if (requestParameters['passwordField'] != null) {
2900
+ queryParameters['password_field'] = requestParameters['passwordField'];
2901
+ }
2902
+ if (requestParameters['policyUuid'] != null) {
2903
+ queryParameters['policy_uuid'] = requestParameters['policyUuid'];
2904
+ }
2905
+ if (requestParameters['search'] != null) {
2906
+ queryParameters['search'] = requestParameters['search'];
2907
+ }
2908
+ const headerParameters = {};
2909
+ if (this.configuration && this.configuration.accessToken) {
2910
+ const token = this.configuration.accessToken;
2911
+ const tokenString = yield token("authentik", []);
2912
+ if (tokenString) {
2913
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
2914
+ }
2915
+ }
2916
+ const response = yield this.request({
2917
+ path: `/policies/unique_password/`,
2918
+ method: 'GET',
2919
+ headers: headerParameters,
2920
+ query: queryParameters,
2921
+ }, initOverrides);
2922
+ return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedUniquePasswordPolicyListFromJSON(jsonValue));
2923
+ });
2924
+ }
2925
+ /**
2926
+ * Password Uniqueness Policy Viewset
2927
+ */
2928
+ policiesUniquePasswordList() {
2929
+ return __awaiter(this, arguments, void 0, function* (requestParameters = {}, initOverrides) {
2930
+ const response = yield this.policiesUniquePasswordListRaw(requestParameters, initOverrides);
2931
+ return yield response.value();
2932
+ });
2933
+ }
2934
+ /**
2935
+ * Password Uniqueness Policy Viewset
2936
+ */
2937
+ policiesUniquePasswordPartialUpdateRaw(requestParameters, initOverrides) {
2938
+ return __awaiter(this, void 0, void 0, function* () {
2939
+ if (requestParameters['policyUuid'] == null) {
2940
+ throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordPartialUpdate().');
2941
+ }
2942
+ const queryParameters = {};
2943
+ const headerParameters = {};
2944
+ headerParameters['Content-Type'] = 'application/json';
2945
+ if (this.configuration && this.configuration.accessToken) {
2946
+ const token = this.configuration.accessToken;
2947
+ const tokenString = yield token("authentik", []);
2948
+ if (tokenString) {
2949
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
2950
+ }
2951
+ }
2952
+ const response = yield this.request({
2953
+ path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
2954
+ method: 'PATCH',
2955
+ headers: headerParameters,
2956
+ query: queryParameters,
2957
+ body: PatchedUniquePasswordPolicyRequestToJSON(requestParameters['patchedUniquePasswordPolicyRequest']),
2958
+ }, initOverrides);
2959
+ return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
2960
+ });
2961
+ }
2962
+ /**
2963
+ * Password Uniqueness Policy Viewset
2964
+ */
2965
+ policiesUniquePasswordPartialUpdate(requestParameters, initOverrides) {
2966
+ return __awaiter(this, void 0, void 0, function* () {
2967
+ const response = yield this.policiesUniquePasswordPartialUpdateRaw(requestParameters, initOverrides);
2968
+ return yield response.value();
2969
+ });
2970
+ }
2971
+ /**
2972
+ * Password Uniqueness Policy Viewset
2973
+ */
2974
+ policiesUniquePasswordRetrieveRaw(requestParameters, initOverrides) {
2975
+ return __awaiter(this, void 0, void 0, function* () {
2976
+ if (requestParameters['policyUuid'] == null) {
2977
+ throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordRetrieve().');
2978
+ }
2979
+ const queryParameters = {};
2980
+ const headerParameters = {};
2981
+ if (this.configuration && this.configuration.accessToken) {
2982
+ const token = this.configuration.accessToken;
2983
+ const tokenString = yield token("authentik", []);
2984
+ if (tokenString) {
2985
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
2986
+ }
2987
+ }
2988
+ const response = yield this.request({
2989
+ path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
2990
+ method: 'GET',
2991
+ headers: headerParameters,
2992
+ query: queryParameters,
2993
+ }, initOverrides);
2994
+ return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
2995
+ });
2996
+ }
2997
+ /**
2998
+ * Password Uniqueness Policy Viewset
2999
+ */
3000
+ policiesUniquePasswordRetrieve(requestParameters, initOverrides) {
3001
+ return __awaiter(this, void 0, void 0, function* () {
3002
+ const response = yield this.policiesUniquePasswordRetrieveRaw(requestParameters, initOverrides);
3003
+ return yield response.value();
3004
+ });
3005
+ }
3006
+ /**
3007
+ * Password Uniqueness Policy Viewset
3008
+ */
3009
+ policiesUniquePasswordUpdateRaw(requestParameters, initOverrides) {
3010
+ return __awaiter(this, void 0, void 0, function* () {
3011
+ if (requestParameters['policyUuid'] == null) {
3012
+ throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordUpdate().');
3013
+ }
3014
+ if (requestParameters['uniquePasswordPolicyRequest'] == null) {
3015
+ throw new runtime.RequiredError('uniquePasswordPolicyRequest', 'Required parameter "uniquePasswordPolicyRequest" was null or undefined when calling policiesUniquePasswordUpdate().');
3016
+ }
3017
+ const queryParameters = {};
3018
+ const headerParameters = {};
3019
+ headerParameters['Content-Type'] = 'application/json';
3020
+ if (this.configuration && this.configuration.accessToken) {
3021
+ const token = this.configuration.accessToken;
3022
+ const tokenString = yield token("authentik", []);
3023
+ if (tokenString) {
3024
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
3025
+ }
3026
+ }
3027
+ const response = yield this.request({
3028
+ path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
3029
+ method: 'PUT',
3030
+ headers: headerParameters,
3031
+ query: queryParameters,
3032
+ body: UniquePasswordPolicyRequestToJSON(requestParameters['uniquePasswordPolicyRequest']),
3033
+ }, initOverrides);
3034
+ return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
3035
+ });
3036
+ }
3037
+ /**
3038
+ * Password Uniqueness Policy Viewset
3039
+ */
3040
+ policiesUniquePasswordUpdate(requestParameters, initOverrides) {
3041
+ return __awaiter(this, void 0, void 0, function* () {
3042
+ const response = yield this.policiesUniquePasswordUpdateRaw(requestParameters, initOverrides);
3043
+ return yield response.value();
3044
+ });
3045
+ }
3046
+ /**
3047
+ * Get a list of all objects that use this object
3048
+ */
3049
+ policiesUniquePasswordUsedByListRaw(requestParameters, initOverrides) {
3050
+ return __awaiter(this, void 0, void 0, function* () {
3051
+ if (requestParameters['policyUuid'] == null) {
3052
+ throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordUsedByList().');
3053
+ }
3054
+ const queryParameters = {};
3055
+ const headerParameters = {};
3056
+ if (this.configuration && this.configuration.accessToken) {
3057
+ const token = this.configuration.accessToken;
3058
+ const tokenString = yield token("authentik", []);
3059
+ if (tokenString) {
3060
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
3061
+ }
3062
+ }
3063
+ const response = yield this.request({
3064
+ path: `/policies/unique_password/{policy_uuid}/used_by/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
3065
+ method: 'GET',
3066
+ headers: headerParameters,
3067
+ query: queryParameters,
3068
+ }, initOverrides);
3069
+ return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(UsedByFromJSON));
3070
+ });
3071
+ }
3072
+ /**
3073
+ * Get a list of all objects that use this object
3074
+ */
3075
+ policiesUniquePasswordUsedByList(requestParameters, initOverrides) {
3076
+ return __awaiter(this, void 0, void 0, function* () {
3077
+ const response = yield this.policiesUniquePasswordUsedByListRaw(requestParameters, initOverrides);
3078
+ return yield response.value();
3079
+ });
3080
+ }
2798
3081
  }
2799
3082
  /**
2800
3083
  * @export
@@ -445,6 +445,7 @@ export declare const RbacPermissionsAssignedByRolesListModelEnum: {
445
445
  readonly AuthentikPoliciesGeoipGeoippolicy: "authentik_policies_geoip.geoippolicy";
446
446
  readonly AuthentikPoliciesPasswordPasswordpolicy: "authentik_policies_password.passwordpolicy";
447
447
  readonly AuthentikPoliciesReputationReputationpolicy: "authentik_policies_reputation.reputationpolicy";
448
+ readonly AuthentikPoliciesUniquePasswordUniquepasswordpolicy: "authentik_policies_unique_password.uniquepasswordpolicy";
448
449
  readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: "authentik_providers_google_workspace.googleworkspaceprovider";
449
450
  readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: "authentik_providers_google_workspace.googleworkspaceprovidermapping";
450
451
  readonly AuthentikProvidersLdapLdapprovider: "authentik_providers_ldap.ldapprovider";
@@ -554,6 +555,7 @@ export declare const RbacPermissionsAssignedByUsersListModelEnum: {
554
555
  readonly AuthentikPoliciesGeoipGeoippolicy: "authentik_policies_geoip.geoippolicy";
555
556
  readonly AuthentikPoliciesPasswordPasswordpolicy: "authentik_policies_password.passwordpolicy";
556
557
  readonly AuthentikPoliciesReputationReputationpolicy: "authentik_policies_reputation.reputationpolicy";
558
+ readonly AuthentikPoliciesUniquePasswordUniquepasswordpolicy: "authentik_policies_unique_password.uniquepasswordpolicy";
557
559
  readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: "authentik_providers_google_workspace.googleworkspaceprovider";
558
560
  readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: "authentik_providers_google_workspace.googleworkspaceprovidermapping";
559
561
  readonly AuthentikProvidersLdapLdapprovider: "authentik_providers_ldap.ldapprovider";
@@ -1326,6 +1326,7 @@ export const RbacPermissionsAssignedByRolesListModelEnum = {
1326
1326
  AuthentikPoliciesGeoipGeoippolicy: 'authentik_policies_geoip.geoippolicy',
1327
1327
  AuthentikPoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
1328
1328
  AuthentikPoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
1329
+ AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
1329
1330
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
1330
1331
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
1331
1332
  AuthentikProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
@@ -1434,6 +1435,7 @@ export const RbacPermissionsAssignedByUsersListModelEnum = {
1434
1435
  AuthentikPoliciesGeoipGeoippolicy: 'authentik_policies_geoip.geoippolicy',
1435
1436
  AuthentikPoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
1436
1437
  AuthentikPoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
1438
+ AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
1437
1439
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
1438
1440
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
1439
1441
  AuthentikProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
@@ -70,6 +70,7 @@ export declare const AppEnum: {
70
70
  readonly AuthentikCore: "authentik.core";
71
71
  readonly AuthentikEnterprise: "authentik.enterprise";
72
72
  readonly AuthentikEnterpriseAudit: "authentik.enterprise.audit";
73
+ readonly AuthentikEnterprisePoliciesUniquePassword: "authentik.enterprise.policies.unique_password";
73
74
  readonly AuthentikEnterpriseProvidersGoogleWorkspace: "authentik.enterprise.providers.google_workspace";
74
75
  readonly AuthentikEnterpriseProvidersMicrosoftEntra: "authentik.enterprise.providers.microsoft_entra";
75
76
  readonly AuthentikEnterpriseProvidersSsf: "authentik.enterprise.providers.ssf";
@@ -72,6 +72,7 @@ export const AppEnum = {
72
72
  AuthentikCore: 'authentik.core',
73
73
  AuthentikEnterprise: 'authentik.enterprise',
74
74
  AuthentikEnterpriseAudit: 'authentik.enterprise.audit',
75
+ AuthentikEnterprisePoliciesUniquePassword: 'authentik.enterprise.policies.unique_password',
75
76
  AuthentikEnterpriseProvidersGoogleWorkspace: 'authentik.enterprise.providers.google_workspace',
76
77
  AuthentikEnterpriseProvidersMicrosoftEntra: 'authentik.enterprise.providers.microsoft_entra',
77
78
  AuthentikEnterpriseProvidersSsf: 'authentik.enterprise.providers.ssf',
@@ -112,6 +112,12 @@ export interface IdentificationChallenge {
112
112
  * @memberof IdentificationChallenge
113
113
  */
114
114
  showSourceLabels: boolean;
115
+ /**
116
+ *
117
+ * @type {boolean}
118
+ * @memberof IdentificationChallenge
119
+ */
120
+ enableRememberMe?: boolean;
115
121
  }
116
122
  /**
117
123
  * Check if a given object implements the IdentificationChallenge interface.
@@ -54,6 +54,7 @@ export function IdentificationChallengeFromJSONTyped(json, ignoreDiscriminator)
54
54
  'primaryAction': json['primary_action'],
55
55
  'sources': json['sources'] == null ? undefined : (json['sources'].map(LoginSourceFromJSON)),
56
56
  'showSourceLabels': json['show_source_labels'],
57
+ 'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
57
58
  };
58
59
  }
59
60
  export function IdentificationChallengeToJSON(json) {
@@ -79,5 +80,6 @@ export function IdentificationChallengeToJSONTyped(value, ignoreDiscriminator =
79
80
  'primary_action': value['primaryAction'],
80
81
  'sources': value['sources'] == null ? undefined : (value['sources'].map(LoginSourceToJSON)),
81
82
  'show_source_labels': value['showSourceLabels'],
83
+ 'enable_remember_me': value['enableRememberMe'],
82
84
  };
83
85
  }
@@ -125,6 +125,12 @@ export interface IdentificationStage {
125
125
  * @memberof IdentificationStage
126
126
  */
127
127
  pretendUserExists?: boolean;
128
+ /**
129
+ * Show the user the 'Remember me on this device' toggle, allowing repeat users to skip straight to entering their password.
130
+ * @type {boolean}
131
+ * @memberof IdentificationStage
132
+ */
133
+ enableRememberMe?: boolean;
128
134
  }
129
135
  /**
130
136
  * Check if a given object implements the IdentificationStage interface.
@@ -57,6 +57,7 @@ export function IdentificationStageFromJSONTyped(json, ignoreDiscriminator) {
57
57
  'sources': json['sources'] == null ? undefined : json['sources'],
58
58
  'showSourceLabels': json['show_source_labels'] == null ? undefined : json['show_source_labels'],
59
59
  'pretendUserExists': json['pretend_user_exists'] == null ? undefined : json['pretend_user_exists'],
60
+ 'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
60
61
  };
61
62
  }
62
63
  export function IdentificationStageToJSON(json) {
@@ -80,5 +81,6 @@ export function IdentificationStageToJSONTyped(value, ignoreDiscriminator = fals
80
81
  'sources': value['sources'],
81
82
  'show_source_labels': value['showSourceLabels'],
82
83
  'pretend_user_exists': value['pretendUserExists'],
84
+ 'enable_remember_me': value['enableRememberMe'],
83
85
  };
84
86
  }
@@ -95,6 +95,12 @@ export interface IdentificationStageRequest {
95
95
  * @memberof IdentificationStageRequest
96
96
  */
97
97
  pretendUserExists?: boolean;
98
+ /**
99
+ * Show the user the 'Remember me on this device' toggle, allowing repeat users to skip straight to entering their password.
100
+ * @type {boolean}
101
+ * @memberof IdentificationStageRequest
102
+ */
103
+ enableRememberMe?: boolean;
98
104
  }
99
105
  /**
100
106
  * Check if a given object implements the IdentificationStageRequest interface.
@@ -42,6 +42,7 @@ export function IdentificationStageRequestFromJSONTyped(json, ignoreDiscriminato
42
42
  'sources': json['sources'] == null ? undefined : json['sources'],
43
43
  'showSourceLabels': json['show_source_labels'] == null ? undefined : json['show_source_labels'],
44
44
  'pretendUserExists': json['pretend_user_exists'] == null ? undefined : json['pretend_user_exists'],
45
+ 'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
45
46
  };
46
47
  }
47
48
  export function IdentificationStageRequestToJSON(json) {
@@ -65,5 +66,6 @@ export function IdentificationStageRequestToJSONTyped(value, ignoreDiscriminator
65
66
  'sources': value['sources'],
66
67
  'show_source_labels': value['showSourceLabels'],
67
68
  'pretend_user_exists': value['pretendUserExists'],
69
+ 'enable_remember_me': value['enableRememberMe'],
68
70
  };
69
71
  }
@@ -104,6 +104,7 @@ export declare const ModelEnum: {
104
104
  readonly AuthentikCoreApplicationentitlement: "authentik_core.applicationentitlement";
105
105
  readonly AuthentikCoreToken: "authentik_core.token";
106
106
  readonly AuthentikEnterpriseLicense: "authentik_enterprise.license";
107
+ readonly AuthentikPoliciesUniquePasswordUniquepasswordpolicy: "authentik_policies_unique_password.uniquepasswordpolicy";
107
108
  readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: "authentik_providers_google_workspace.googleworkspaceprovider";
108
109
  readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: "authentik_providers_google_workspace.googleworkspaceprovidermapping";
109
110
  readonly AuthentikProvidersMicrosoftEntraMicrosoftentraprovider: "authentik_providers_microsoft_entra.microsoftentraprovider";
@@ -106,6 +106,7 @@ export const ModelEnum = {
106
106
  AuthentikCoreApplicationentitlement: 'authentik_core.applicationentitlement',
107
107
  AuthentikCoreToken: 'authentik_core.token',
108
108
  AuthentikEnterpriseLicense: 'authentik_enterprise.license',
109
+ AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
109
110
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
110
111
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
111
112
  AuthentikProvidersMicrosoftEntraMicrosoftentraprovider: 'authentik_providers_microsoft_entra.microsoftentraprovider',
@@ -0,0 +1,40 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2025.2.4
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { Pagination } from './Pagination';
13
+ import type { UniquePasswordPolicy } from './UniquePasswordPolicy';
14
+ /**
15
+ *
16
+ * @export
17
+ * @interface PaginatedUniquePasswordPolicyList
18
+ */
19
+ export interface PaginatedUniquePasswordPolicyList {
20
+ /**
21
+ *
22
+ * @type {Pagination}
23
+ * @memberof PaginatedUniquePasswordPolicyList
24
+ */
25
+ pagination: Pagination;
26
+ /**
27
+ *
28
+ * @type {Array<UniquePasswordPolicy>}
29
+ * @memberof PaginatedUniquePasswordPolicyList
30
+ */
31
+ results: Array<UniquePasswordPolicy>;
32
+ }
33
+ /**
34
+ * Check if a given object implements the PaginatedUniquePasswordPolicyList interface.
35
+ */
36
+ export declare function instanceOfPaginatedUniquePasswordPolicyList(value: object): value is PaginatedUniquePasswordPolicyList;
37
+ export declare function PaginatedUniquePasswordPolicyListFromJSON(json: any): PaginatedUniquePasswordPolicyList;
38
+ export declare function PaginatedUniquePasswordPolicyListFromJSONTyped(json: any, ignoreDiscriminator: boolean): PaginatedUniquePasswordPolicyList;
39
+ export declare function PaginatedUniquePasswordPolicyListToJSON(json: any): PaginatedUniquePasswordPolicyList;
40
+ export declare function PaginatedUniquePasswordPolicyListToJSONTyped(value?: PaginatedUniquePasswordPolicyList | null, ignoreDiscriminator?: boolean): any;
@@ -0,0 +1,49 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2025.2.4
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+ import { PaginationFromJSON, PaginationToJSON, } from './Pagination';
15
+ import { UniquePasswordPolicyFromJSON, UniquePasswordPolicyToJSON, } from './UniquePasswordPolicy';
16
+ /**
17
+ * Check if a given object implements the PaginatedUniquePasswordPolicyList interface.
18
+ */
19
+ export function instanceOfPaginatedUniquePasswordPolicyList(value) {
20
+ if (!('pagination' in value) || value['pagination'] === undefined)
21
+ return false;
22
+ if (!('results' in value) || value['results'] === undefined)
23
+ return false;
24
+ return true;
25
+ }
26
+ export function PaginatedUniquePasswordPolicyListFromJSON(json) {
27
+ return PaginatedUniquePasswordPolicyListFromJSONTyped(json, false);
28
+ }
29
+ export function PaginatedUniquePasswordPolicyListFromJSONTyped(json, ignoreDiscriminator) {
30
+ if (json == null) {
31
+ return json;
32
+ }
33
+ return {
34
+ 'pagination': PaginationFromJSON(json['pagination']),
35
+ 'results': (json['results'].map(UniquePasswordPolicyFromJSON)),
36
+ };
37
+ }
38
+ export function PaginatedUniquePasswordPolicyListToJSON(json) {
39
+ return PaginatedUniquePasswordPolicyListToJSONTyped(json, false);
40
+ }
41
+ export function PaginatedUniquePasswordPolicyListToJSONTyped(value, ignoreDiscriminator = false) {
42
+ if (value == null) {
43
+ return value;
44
+ }
45
+ return {
46
+ 'pagination': PaginationToJSON(value['pagination']),
47
+ 'results': (value['results'].map(UniquePasswordPolicyToJSON)),
48
+ };
49
+ }
@@ -95,6 +95,12 @@ export interface PatchedIdentificationStageRequest {
95
95
  * @memberof PatchedIdentificationStageRequest
96
96
  */
97
97
  pretendUserExists?: boolean;
98
+ /**
99
+ * Show the user the 'Remember me on this device' toggle, allowing repeat users to skip straight to entering their password.
100
+ * @type {boolean}
101
+ * @memberof PatchedIdentificationStageRequest
102
+ */
103
+ enableRememberMe?: boolean;
98
104
  }
99
105
  /**
100
106
  * Check if a given object implements the PatchedIdentificationStageRequest interface.
@@ -40,6 +40,7 @@ export function PatchedIdentificationStageRequestFromJSONTyped(json, ignoreDiscr
40
40
  'sources': json['sources'] == null ? undefined : json['sources'],
41
41
  'showSourceLabels': json['show_source_labels'] == null ? undefined : json['show_source_labels'],
42
42
  'pretendUserExists': json['pretend_user_exists'] == null ? undefined : json['pretend_user_exists'],
43
+ 'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
43
44
  };
44
45
  }
45
46
  export function PatchedIdentificationStageRequestToJSON(json) {
@@ -63,5 +64,6 @@ export function PatchedIdentificationStageRequestToJSONTyped(value, ignoreDiscri
63
64
  'sources': value['sources'],
64
65
  'show_source_labels': value['showSourceLabels'],
65
66
  'pretend_user_exists': value['pretendUserExists'],
67
+ 'enable_remember_me': value['enableRememberMe'],
66
68
  };
67
69
  }
@@ -0,0 +1,50 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2025.2.4
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ /**
13
+ * Password Uniqueness Policy Serializer
14
+ * @export
15
+ * @interface PatchedUniquePasswordPolicyRequest
16
+ */
17
+ export interface PatchedUniquePasswordPolicyRequest {
18
+ /**
19
+ *
20
+ * @type {string}
21
+ * @memberof PatchedUniquePasswordPolicyRequest
22
+ */
23
+ name?: string;
24
+ /**
25
+ * When this option is enabled, all executions of this policy will be logged. By default, only execution errors are logged.
26
+ * @type {boolean}
27
+ * @memberof PatchedUniquePasswordPolicyRequest
28
+ */
29
+ executionLogging?: boolean;
30
+ /**
31
+ * Field key to check, field keys defined in Prompt stages are available.
32
+ * @type {string}
33
+ * @memberof PatchedUniquePasswordPolicyRequest
34
+ */
35
+ passwordField?: string;
36
+ /**
37
+ * Number of passwords to check against.
38
+ * @type {number}
39
+ * @memberof PatchedUniquePasswordPolicyRequest
40
+ */
41
+ numHistoricalPasswords?: number;
42
+ }
43
+ /**
44
+ * Check if a given object implements the PatchedUniquePasswordPolicyRequest interface.
45
+ */
46
+ export declare function instanceOfPatchedUniquePasswordPolicyRequest(value: object): value is PatchedUniquePasswordPolicyRequest;
47
+ export declare function PatchedUniquePasswordPolicyRequestFromJSON(json: any): PatchedUniquePasswordPolicyRequest;
48
+ export declare function PatchedUniquePasswordPolicyRequestFromJSONTyped(json: any, ignoreDiscriminator: boolean): PatchedUniquePasswordPolicyRequest;
49
+ export declare function PatchedUniquePasswordPolicyRequestToJSON(json: any): PatchedUniquePasswordPolicyRequest;
50
+ export declare function PatchedUniquePasswordPolicyRequestToJSONTyped(value?: PatchedUniquePasswordPolicyRequest | null, ignoreDiscriminator?: boolean): any;