@goauthentik/api 2025.2.4-1744808430 → 2025.2.4-1745325566
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +4 -0
- package/dist/apis/PoliciesApi.d.ts +90 -1
- package/dist/apis/PoliciesApi.js +283 -0
- package/dist/apis/RbacApi.d.ts +2 -0
- package/dist/apis/RbacApi.js +2 -0
- package/dist/esm/apis/PoliciesApi.d.ts +90 -1
- package/dist/esm/apis/PoliciesApi.js +284 -1
- package/dist/esm/apis/RbacApi.d.ts +2 -0
- package/dist/esm/apis/RbacApi.js +2 -0
- package/dist/esm/models/AppEnum.d.ts +1 -0
- package/dist/esm/models/AppEnum.js +1 -0
- package/dist/esm/models/IdentificationChallenge.d.ts +6 -0
- package/dist/esm/models/IdentificationChallenge.js +2 -0
- package/dist/esm/models/IdentificationStage.d.ts +6 -0
- package/dist/esm/models/IdentificationStage.js +2 -0
- package/dist/esm/models/IdentificationStageRequest.d.ts +6 -0
- package/dist/esm/models/IdentificationStageRequest.js +2 -0
- package/dist/esm/models/ModelEnum.d.ts +1 -0
- package/dist/esm/models/ModelEnum.js +1 -0
- package/dist/esm/models/PaginatedUniquePasswordPolicyList.d.ts +40 -0
- package/dist/esm/models/PaginatedUniquePasswordPolicyList.js +49 -0
- package/dist/esm/models/PatchedIdentificationStageRequest.d.ts +6 -0
- package/dist/esm/models/PatchedIdentificationStageRequest.js +2 -0
- package/dist/esm/models/PatchedUniquePasswordPolicyRequest.d.ts +50 -0
- package/dist/esm/models/PatchedUniquePasswordPolicyRequest.js +47 -0
- package/dist/esm/models/UniquePasswordPolicy.d.ts +86 -0
- package/dist/esm/models/UniquePasswordPolicy.js +67 -0
- package/dist/esm/models/UniquePasswordPolicyRequest.d.ts +50 -0
- package/dist/esm/models/UniquePasswordPolicyRequest.js +49 -0
- package/dist/esm/models/index.d.ts +4 -0
- package/dist/esm/models/index.js +4 -0
- package/dist/models/AppEnum.d.ts +1 -0
- package/dist/models/AppEnum.js +1 -0
- package/dist/models/IdentificationChallenge.d.ts +6 -0
- package/dist/models/IdentificationChallenge.js +2 -0
- package/dist/models/IdentificationStage.d.ts +6 -0
- package/dist/models/IdentificationStage.js +2 -0
- package/dist/models/IdentificationStageRequest.d.ts +6 -0
- package/dist/models/IdentificationStageRequest.js +2 -0
- package/dist/models/ModelEnum.d.ts +1 -0
- package/dist/models/ModelEnum.js +1 -0
- package/dist/models/PaginatedUniquePasswordPolicyList.d.ts +40 -0
- package/dist/models/PaginatedUniquePasswordPolicyList.js +56 -0
- package/dist/models/PatchedIdentificationStageRequest.d.ts +6 -0
- package/dist/models/PatchedIdentificationStageRequest.js +2 -0
- package/dist/models/PatchedUniquePasswordPolicyRequest.d.ts +50 -0
- package/dist/models/PatchedUniquePasswordPolicyRequest.js +54 -0
- package/dist/models/UniquePasswordPolicy.d.ts +86 -0
- package/dist/models/UniquePasswordPolicy.js +74 -0
- package/dist/models/UniquePasswordPolicyRequest.d.ts +50 -0
- package/dist/models/UniquePasswordPolicyRequest.js +56 -0
- package/dist/models/index.d.ts +4 -0
- package/dist/models/index.js +4 -0
- package/package.json +1 -1
- package/src/apis/PoliciesApi.ts +391 -0
- package/src/apis/RbacApi.ts +2 -0
- package/src/models/AppEnum.ts +1 -0
- package/src/models/IdentificationChallenge.ts +8 -0
- package/src/models/IdentificationStage.ts +8 -0
- package/src/models/IdentificationStageRequest.ts +8 -0
- package/src/models/ModelEnum.ts +1 -0
- package/src/models/PaginatedUniquePasswordPolicyList.ts +90 -0
- package/src/models/PatchedIdentificationStageRequest.ts +8 -0
- package/src/models/PatchedUniquePasswordPolicyRequest.ts +89 -0
- package/src/models/UniquePasswordPolicy.ts +138 -0
- package/src/models/UniquePasswordPolicyRequest.ts +90 -0
- package/src/models/index.ts +4 -0
|
@@ -21,7 +21,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
|
|
|
21
21
|
});
|
|
22
22
|
};
|
|
23
23
|
import * as runtime from '../runtime';
|
|
24
|
-
import { CacheFromJSON, DetailedCountryFromJSON, DummyPolicyFromJSON, DummyPolicyRequestToJSON, EventMatcherPolicyFromJSON, EventMatcherPolicyRequestToJSON, ExpressionPolicyFromJSON, ExpressionPolicyRequestToJSON, GeoIPPolicyFromJSON, GeoIPPolicyRequestToJSON, PaginatedDummyPolicyListFromJSON, PaginatedEventMatcherPolicyListFromJSON, PaginatedExpressionPolicyListFromJSON, PaginatedGeoIPPolicyListFromJSON, PaginatedPasswordExpiryPolicyListFromJSON, PaginatedPasswordPolicyListFromJSON, PaginatedPolicyBindingListFromJSON, PaginatedPolicyListFromJSON, PaginatedReputationListFromJSON, PaginatedReputationPolicyListFromJSON, PasswordExpiryPolicyFromJSON, PasswordExpiryPolicyRequestToJSON, PasswordPolicyFromJSON, PasswordPolicyRequestToJSON, PatchedDummyPolicyRequestToJSON, PatchedEventMatcherPolicyRequestToJSON, PatchedExpressionPolicyRequestToJSON, PatchedGeoIPPolicyRequestToJSON, PatchedPasswordExpiryPolicyRequestToJSON, PatchedPasswordPolicyRequestToJSON, PatchedPolicyBindingRequestToJSON, PatchedReputationPolicyRequestToJSON, PolicyFromJSON, PolicyBindingFromJSON, PolicyBindingRequestToJSON, PolicyTestRequestToJSON, PolicyTestResultFromJSON, ReputationFromJSON, ReputationPolicyFromJSON, ReputationPolicyRequestToJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models/index';
|
|
24
|
+
import { CacheFromJSON, DetailedCountryFromJSON, DummyPolicyFromJSON, DummyPolicyRequestToJSON, EventMatcherPolicyFromJSON, EventMatcherPolicyRequestToJSON, ExpressionPolicyFromJSON, ExpressionPolicyRequestToJSON, GeoIPPolicyFromJSON, GeoIPPolicyRequestToJSON, PaginatedDummyPolicyListFromJSON, PaginatedEventMatcherPolicyListFromJSON, PaginatedExpressionPolicyListFromJSON, PaginatedGeoIPPolicyListFromJSON, PaginatedPasswordExpiryPolicyListFromJSON, PaginatedPasswordPolicyListFromJSON, PaginatedPolicyBindingListFromJSON, PaginatedPolicyListFromJSON, PaginatedReputationListFromJSON, PaginatedReputationPolicyListFromJSON, PaginatedUniquePasswordPolicyListFromJSON, PasswordExpiryPolicyFromJSON, PasswordExpiryPolicyRequestToJSON, PasswordPolicyFromJSON, PasswordPolicyRequestToJSON, PatchedDummyPolicyRequestToJSON, PatchedEventMatcherPolicyRequestToJSON, PatchedExpressionPolicyRequestToJSON, PatchedGeoIPPolicyRequestToJSON, PatchedPasswordExpiryPolicyRequestToJSON, PatchedPasswordPolicyRequestToJSON, PatchedPolicyBindingRequestToJSON, PatchedReputationPolicyRequestToJSON, PatchedUniquePasswordPolicyRequestToJSON, PolicyFromJSON, PolicyBindingFromJSON, PolicyBindingRequestToJSON, PolicyTestRequestToJSON, PolicyTestResultFromJSON, ReputationFromJSON, ReputationPolicyFromJSON, ReputationPolicyRequestToJSON, TypeCreateFromJSON, UniquePasswordPolicyFromJSON, UniquePasswordPolicyRequestToJSON, UsedByFromJSON, } from '../models/index';
|
|
25
25
|
/**
|
|
26
26
|
*
|
|
27
27
|
*/
|
|
@@ -2795,6 +2795,289 @@ export class PoliciesApi extends runtime.BaseAPI {
|
|
|
2795
2795
|
return yield response.value();
|
|
2796
2796
|
});
|
|
2797
2797
|
}
|
|
2798
|
+
/**
|
|
2799
|
+
* Password Uniqueness Policy Viewset
|
|
2800
|
+
*/
|
|
2801
|
+
policiesUniquePasswordCreateRaw(requestParameters, initOverrides) {
|
|
2802
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2803
|
+
if (requestParameters['uniquePasswordPolicyRequest'] == null) {
|
|
2804
|
+
throw new runtime.RequiredError('uniquePasswordPolicyRequest', 'Required parameter "uniquePasswordPolicyRequest" was null or undefined when calling policiesUniquePasswordCreate().');
|
|
2805
|
+
}
|
|
2806
|
+
const queryParameters = {};
|
|
2807
|
+
const headerParameters = {};
|
|
2808
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
2809
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
2810
|
+
const token = this.configuration.accessToken;
|
|
2811
|
+
const tokenString = yield token("authentik", []);
|
|
2812
|
+
if (tokenString) {
|
|
2813
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
2814
|
+
}
|
|
2815
|
+
}
|
|
2816
|
+
const response = yield this.request({
|
|
2817
|
+
path: `/policies/unique_password/`,
|
|
2818
|
+
method: 'POST',
|
|
2819
|
+
headers: headerParameters,
|
|
2820
|
+
query: queryParameters,
|
|
2821
|
+
body: UniquePasswordPolicyRequestToJSON(requestParameters['uniquePasswordPolicyRequest']),
|
|
2822
|
+
}, initOverrides);
|
|
2823
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
|
|
2824
|
+
});
|
|
2825
|
+
}
|
|
2826
|
+
/**
|
|
2827
|
+
* Password Uniqueness Policy Viewset
|
|
2828
|
+
*/
|
|
2829
|
+
policiesUniquePasswordCreate(requestParameters, initOverrides) {
|
|
2830
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2831
|
+
const response = yield this.policiesUniquePasswordCreateRaw(requestParameters, initOverrides);
|
|
2832
|
+
return yield response.value();
|
|
2833
|
+
});
|
|
2834
|
+
}
|
|
2835
|
+
/**
|
|
2836
|
+
* Password Uniqueness Policy Viewset
|
|
2837
|
+
*/
|
|
2838
|
+
policiesUniquePasswordDestroyRaw(requestParameters, initOverrides) {
|
|
2839
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2840
|
+
if (requestParameters['policyUuid'] == null) {
|
|
2841
|
+
throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordDestroy().');
|
|
2842
|
+
}
|
|
2843
|
+
const queryParameters = {};
|
|
2844
|
+
const headerParameters = {};
|
|
2845
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
2846
|
+
const token = this.configuration.accessToken;
|
|
2847
|
+
const tokenString = yield token("authentik", []);
|
|
2848
|
+
if (tokenString) {
|
|
2849
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
2850
|
+
}
|
|
2851
|
+
}
|
|
2852
|
+
const response = yield this.request({
|
|
2853
|
+
path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
2854
|
+
method: 'DELETE',
|
|
2855
|
+
headers: headerParameters,
|
|
2856
|
+
query: queryParameters,
|
|
2857
|
+
}, initOverrides);
|
|
2858
|
+
return new runtime.VoidApiResponse(response);
|
|
2859
|
+
});
|
|
2860
|
+
}
|
|
2861
|
+
/**
|
|
2862
|
+
* Password Uniqueness Policy Viewset
|
|
2863
|
+
*/
|
|
2864
|
+
policiesUniquePasswordDestroy(requestParameters, initOverrides) {
|
|
2865
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2866
|
+
yield this.policiesUniquePasswordDestroyRaw(requestParameters, initOverrides);
|
|
2867
|
+
});
|
|
2868
|
+
}
|
|
2869
|
+
/**
|
|
2870
|
+
* Password Uniqueness Policy Viewset
|
|
2871
|
+
*/
|
|
2872
|
+
policiesUniquePasswordListRaw(requestParameters, initOverrides) {
|
|
2873
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2874
|
+
const queryParameters = {};
|
|
2875
|
+
if (requestParameters['created'] != null) {
|
|
2876
|
+
queryParameters['created'] = requestParameters['created'].toISOString();
|
|
2877
|
+
}
|
|
2878
|
+
if (requestParameters['executionLogging'] != null) {
|
|
2879
|
+
queryParameters['execution_logging'] = requestParameters['executionLogging'];
|
|
2880
|
+
}
|
|
2881
|
+
if (requestParameters['lastUpdated'] != null) {
|
|
2882
|
+
queryParameters['last_updated'] = requestParameters['lastUpdated'].toISOString();
|
|
2883
|
+
}
|
|
2884
|
+
if (requestParameters['name'] != null) {
|
|
2885
|
+
queryParameters['name'] = requestParameters['name'];
|
|
2886
|
+
}
|
|
2887
|
+
if (requestParameters['numHistoricalPasswords'] != null) {
|
|
2888
|
+
queryParameters['num_historical_passwords'] = requestParameters['numHistoricalPasswords'];
|
|
2889
|
+
}
|
|
2890
|
+
if (requestParameters['ordering'] != null) {
|
|
2891
|
+
queryParameters['ordering'] = requestParameters['ordering'];
|
|
2892
|
+
}
|
|
2893
|
+
if (requestParameters['page'] != null) {
|
|
2894
|
+
queryParameters['page'] = requestParameters['page'];
|
|
2895
|
+
}
|
|
2896
|
+
if (requestParameters['pageSize'] != null) {
|
|
2897
|
+
queryParameters['page_size'] = requestParameters['pageSize'];
|
|
2898
|
+
}
|
|
2899
|
+
if (requestParameters['passwordField'] != null) {
|
|
2900
|
+
queryParameters['password_field'] = requestParameters['passwordField'];
|
|
2901
|
+
}
|
|
2902
|
+
if (requestParameters['policyUuid'] != null) {
|
|
2903
|
+
queryParameters['policy_uuid'] = requestParameters['policyUuid'];
|
|
2904
|
+
}
|
|
2905
|
+
if (requestParameters['search'] != null) {
|
|
2906
|
+
queryParameters['search'] = requestParameters['search'];
|
|
2907
|
+
}
|
|
2908
|
+
const headerParameters = {};
|
|
2909
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
2910
|
+
const token = this.configuration.accessToken;
|
|
2911
|
+
const tokenString = yield token("authentik", []);
|
|
2912
|
+
if (tokenString) {
|
|
2913
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
2914
|
+
}
|
|
2915
|
+
}
|
|
2916
|
+
const response = yield this.request({
|
|
2917
|
+
path: `/policies/unique_password/`,
|
|
2918
|
+
method: 'GET',
|
|
2919
|
+
headers: headerParameters,
|
|
2920
|
+
query: queryParameters,
|
|
2921
|
+
}, initOverrides);
|
|
2922
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedUniquePasswordPolicyListFromJSON(jsonValue));
|
|
2923
|
+
});
|
|
2924
|
+
}
|
|
2925
|
+
/**
|
|
2926
|
+
* Password Uniqueness Policy Viewset
|
|
2927
|
+
*/
|
|
2928
|
+
policiesUniquePasswordList() {
|
|
2929
|
+
return __awaiter(this, arguments, void 0, function* (requestParameters = {}, initOverrides) {
|
|
2930
|
+
const response = yield this.policiesUniquePasswordListRaw(requestParameters, initOverrides);
|
|
2931
|
+
return yield response.value();
|
|
2932
|
+
});
|
|
2933
|
+
}
|
|
2934
|
+
/**
|
|
2935
|
+
* Password Uniqueness Policy Viewset
|
|
2936
|
+
*/
|
|
2937
|
+
policiesUniquePasswordPartialUpdateRaw(requestParameters, initOverrides) {
|
|
2938
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2939
|
+
if (requestParameters['policyUuid'] == null) {
|
|
2940
|
+
throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordPartialUpdate().');
|
|
2941
|
+
}
|
|
2942
|
+
const queryParameters = {};
|
|
2943
|
+
const headerParameters = {};
|
|
2944
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
2945
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
2946
|
+
const token = this.configuration.accessToken;
|
|
2947
|
+
const tokenString = yield token("authentik", []);
|
|
2948
|
+
if (tokenString) {
|
|
2949
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
2950
|
+
}
|
|
2951
|
+
}
|
|
2952
|
+
const response = yield this.request({
|
|
2953
|
+
path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
2954
|
+
method: 'PATCH',
|
|
2955
|
+
headers: headerParameters,
|
|
2956
|
+
query: queryParameters,
|
|
2957
|
+
body: PatchedUniquePasswordPolicyRequestToJSON(requestParameters['patchedUniquePasswordPolicyRequest']),
|
|
2958
|
+
}, initOverrides);
|
|
2959
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
|
|
2960
|
+
});
|
|
2961
|
+
}
|
|
2962
|
+
/**
|
|
2963
|
+
* Password Uniqueness Policy Viewset
|
|
2964
|
+
*/
|
|
2965
|
+
policiesUniquePasswordPartialUpdate(requestParameters, initOverrides) {
|
|
2966
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2967
|
+
const response = yield this.policiesUniquePasswordPartialUpdateRaw(requestParameters, initOverrides);
|
|
2968
|
+
return yield response.value();
|
|
2969
|
+
});
|
|
2970
|
+
}
|
|
2971
|
+
/**
|
|
2972
|
+
* Password Uniqueness Policy Viewset
|
|
2973
|
+
*/
|
|
2974
|
+
policiesUniquePasswordRetrieveRaw(requestParameters, initOverrides) {
|
|
2975
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2976
|
+
if (requestParameters['policyUuid'] == null) {
|
|
2977
|
+
throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordRetrieve().');
|
|
2978
|
+
}
|
|
2979
|
+
const queryParameters = {};
|
|
2980
|
+
const headerParameters = {};
|
|
2981
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
2982
|
+
const token = this.configuration.accessToken;
|
|
2983
|
+
const tokenString = yield token("authentik", []);
|
|
2984
|
+
if (tokenString) {
|
|
2985
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
2986
|
+
}
|
|
2987
|
+
}
|
|
2988
|
+
const response = yield this.request({
|
|
2989
|
+
path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
2990
|
+
method: 'GET',
|
|
2991
|
+
headers: headerParameters,
|
|
2992
|
+
query: queryParameters,
|
|
2993
|
+
}, initOverrides);
|
|
2994
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
|
|
2995
|
+
});
|
|
2996
|
+
}
|
|
2997
|
+
/**
|
|
2998
|
+
* Password Uniqueness Policy Viewset
|
|
2999
|
+
*/
|
|
3000
|
+
policiesUniquePasswordRetrieve(requestParameters, initOverrides) {
|
|
3001
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
3002
|
+
const response = yield this.policiesUniquePasswordRetrieveRaw(requestParameters, initOverrides);
|
|
3003
|
+
return yield response.value();
|
|
3004
|
+
});
|
|
3005
|
+
}
|
|
3006
|
+
/**
|
|
3007
|
+
* Password Uniqueness Policy Viewset
|
|
3008
|
+
*/
|
|
3009
|
+
policiesUniquePasswordUpdateRaw(requestParameters, initOverrides) {
|
|
3010
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
3011
|
+
if (requestParameters['policyUuid'] == null) {
|
|
3012
|
+
throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordUpdate().');
|
|
3013
|
+
}
|
|
3014
|
+
if (requestParameters['uniquePasswordPolicyRequest'] == null) {
|
|
3015
|
+
throw new runtime.RequiredError('uniquePasswordPolicyRequest', 'Required parameter "uniquePasswordPolicyRequest" was null or undefined when calling policiesUniquePasswordUpdate().');
|
|
3016
|
+
}
|
|
3017
|
+
const queryParameters = {};
|
|
3018
|
+
const headerParameters = {};
|
|
3019
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
3020
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
3021
|
+
const token = this.configuration.accessToken;
|
|
3022
|
+
const tokenString = yield token("authentik", []);
|
|
3023
|
+
if (tokenString) {
|
|
3024
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
3025
|
+
}
|
|
3026
|
+
}
|
|
3027
|
+
const response = yield this.request({
|
|
3028
|
+
path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
3029
|
+
method: 'PUT',
|
|
3030
|
+
headers: headerParameters,
|
|
3031
|
+
query: queryParameters,
|
|
3032
|
+
body: UniquePasswordPolicyRequestToJSON(requestParameters['uniquePasswordPolicyRequest']),
|
|
3033
|
+
}, initOverrides);
|
|
3034
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
|
|
3035
|
+
});
|
|
3036
|
+
}
|
|
3037
|
+
/**
|
|
3038
|
+
* Password Uniqueness Policy Viewset
|
|
3039
|
+
*/
|
|
3040
|
+
policiesUniquePasswordUpdate(requestParameters, initOverrides) {
|
|
3041
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
3042
|
+
const response = yield this.policiesUniquePasswordUpdateRaw(requestParameters, initOverrides);
|
|
3043
|
+
return yield response.value();
|
|
3044
|
+
});
|
|
3045
|
+
}
|
|
3046
|
+
/**
|
|
3047
|
+
* Get a list of all objects that use this object
|
|
3048
|
+
*/
|
|
3049
|
+
policiesUniquePasswordUsedByListRaw(requestParameters, initOverrides) {
|
|
3050
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
3051
|
+
if (requestParameters['policyUuid'] == null) {
|
|
3052
|
+
throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordUsedByList().');
|
|
3053
|
+
}
|
|
3054
|
+
const queryParameters = {};
|
|
3055
|
+
const headerParameters = {};
|
|
3056
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
3057
|
+
const token = this.configuration.accessToken;
|
|
3058
|
+
const tokenString = yield token("authentik", []);
|
|
3059
|
+
if (tokenString) {
|
|
3060
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
3061
|
+
}
|
|
3062
|
+
}
|
|
3063
|
+
const response = yield this.request({
|
|
3064
|
+
path: `/policies/unique_password/{policy_uuid}/used_by/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
3065
|
+
method: 'GET',
|
|
3066
|
+
headers: headerParameters,
|
|
3067
|
+
query: queryParameters,
|
|
3068
|
+
}, initOverrides);
|
|
3069
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(UsedByFromJSON));
|
|
3070
|
+
});
|
|
3071
|
+
}
|
|
3072
|
+
/**
|
|
3073
|
+
* Get a list of all objects that use this object
|
|
3074
|
+
*/
|
|
3075
|
+
policiesUniquePasswordUsedByList(requestParameters, initOverrides) {
|
|
3076
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
3077
|
+
const response = yield this.policiesUniquePasswordUsedByListRaw(requestParameters, initOverrides);
|
|
3078
|
+
return yield response.value();
|
|
3079
|
+
});
|
|
3080
|
+
}
|
|
2798
3081
|
}
|
|
2799
3082
|
/**
|
|
2800
3083
|
* @export
|
|
@@ -445,6 +445,7 @@ export declare const RbacPermissionsAssignedByRolesListModelEnum: {
|
|
|
445
445
|
readonly AuthentikPoliciesGeoipGeoippolicy: "authentik_policies_geoip.geoippolicy";
|
|
446
446
|
readonly AuthentikPoliciesPasswordPasswordpolicy: "authentik_policies_password.passwordpolicy";
|
|
447
447
|
readonly AuthentikPoliciesReputationReputationpolicy: "authentik_policies_reputation.reputationpolicy";
|
|
448
|
+
readonly AuthentikPoliciesUniquePasswordUniquepasswordpolicy: "authentik_policies_unique_password.uniquepasswordpolicy";
|
|
448
449
|
readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: "authentik_providers_google_workspace.googleworkspaceprovider";
|
|
449
450
|
readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: "authentik_providers_google_workspace.googleworkspaceprovidermapping";
|
|
450
451
|
readonly AuthentikProvidersLdapLdapprovider: "authentik_providers_ldap.ldapprovider";
|
|
@@ -554,6 +555,7 @@ export declare const RbacPermissionsAssignedByUsersListModelEnum: {
|
|
|
554
555
|
readonly AuthentikPoliciesGeoipGeoippolicy: "authentik_policies_geoip.geoippolicy";
|
|
555
556
|
readonly AuthentikPoliciesPasswordPasswordpolicy: "authentik_policies_password.passwordpolicy";
|
|
556
557
|
readonly AuthentikPoliciesReputationReputationpolicy: "authentik_policies_reputation.reputationpolicy";
|
|
558
|
+
readonly AuthentikPoliciesUniquePasswordUniquepasswordpolicy: "authentik_policies_unique_password.uniquepasswordpolicy";
|
|
557
559
|
readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: "authentik_providers_google_workspace.googleworkspaceprovider";
|
|
558
560
|
readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: "authentik_providers_google_workspace.googleworkspaceprovidermapping";
|
|
559
561
|
readonly AuthentikProvidersLdapLdapprovider: "authentik_providers_ldap.ldapprovider";
|
package/dist/esm/apis/RbacApi.js
CHANGED
|
@@ -1326,6 +1326,7 @@ export const RbacPermissionsAssignedByRolesListModelEnum = {
|
|
|
1326
1326
|
AuthentikPoliciesGeoipGeoippolicy: 'authentik_policies_geoip.geoippolicy',
|
|
1327
1327
|
AuthentikPoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
|
|
1328
1328
|
AuthentikPoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
|
|
1329
|
+
AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
|
|
1329
1330
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
|
|
1330
1331
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
|
|
1331
1332
|
AuthentikProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
|
|
@@ -1434,6 +1435,7 @@ export const RbacPermissionsAssignedByUsersListModelEnum = {
|
|
|
1434
1435
|
AuthentikPoliciesGeoipGeoippolicy: 'authentik_policies_geoip.geoippolicy',
|
|
1435
1436
|
AuthentikPoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
|
|
1436
1437
|
AuthentikPoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
|
|
1438
|
+
AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
|
|
1437
1439
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
|
|
1438
1440
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
|
|
1439
1441
|
AuthentikProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
|
|
@@ -70,6 +70,7 @@ export declare const AppEnum: {
|
|
|
70
70
|
readonly AuthentikCore: "authentik.core";
|
|
71
71
|
readonly AuthentikEnterprise: "authentik.enterprise";
|
|
72
72
|
readonly AuthentikEnterpriseAudit: "authentik.enterprise.audit";
|
|
73
|
+
readonly AuthentikEnterprisePoliciesUniquePassword: "authentik.enterprise.policies.unique_password";
|
|
73
74
|
readonly AuthentikEnterpriseProvidersGoogleWorkspace: "authentik.enterprise.providers.google_workspace";
|
|
74
75
|
readonly AuthentikEnterpriseProvidersMicrosoftEntra: "authentik.enterprise.providers.microsoft_entra";
|
|
75
76
|
readonly AuthentikEnterpriseProvidersSsf: "authentik.enterprise.providers.ssf";
|
|
@@ -72,6 +72,7 @@ export const AppEnum = {
|
|
|
72
72
|
AuthentikCore: 'authentik.core',
|
|
73
73
|
AuthentikEnterprise: 'authentik.enterprise',
|
|
74
74
|
AuthentikEnterpriseAudit: 'authentik.enterprise.audit',
|
|
75
|
+
AuthentikEnterprisePoliciesUniquePassword: 'authentik.enterprise.policies.unique_password',
|
|
75
76
|
AuthentikEnterpriseProvidersGoogleWorkspace: 'authentik.enterprise.providers.google_workspace',
|
|
76
77
|
AuthentikEnterpriseProvidersMicrosoftEntra: 'authentik.enterprise.providers.microsoft_entra',
|
|
77
78
|
AuthentikEnterpriseProvidersSsf: 'authentik.enterprise.providers.ssf',
|
|
@@ -112,6 +112,12 @@ export interface IdentificationChallenge {
|
|
|
112
112
|
* @memberof IdentificationChallenge
|
|
113
113
|
*/
|
|
114
114
|
showSourceLabels: boolean;
|
|
115
|
+
/**
|
|
116
|
+
*
|
|
117
|
+
* @type {boolean}
|
|
118
|
+
* @memberof IdentificationChallenge
|
|
119
|
+
*/
|
|
120
|
+
enableRememberMe?: boolean;
|
|
115
121
|
}
|
|
116
122
|
/**
|
|
117
123
|
* Check if a given object implements the IdentificationChallenge interface.
|
|
@@ -54,6 +54,7 @@ export function IdentificationChallengeFromJSONTyped(json, ignoreDiscriminator)
|
|
|
54
54
|
'primaryAction': json['primary_action'],
|
|
55
55
|
'sources': json['sources'] == null ? undefined : (json['sources'].map(LoginSourceFromJSON)),
|
|
56
56
|
'showSourceLabels': json['show_source_labels'],
|
|
57
|
+
'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
|
|
57
58
|
};
|
|
58
59
|
}
|
|
59
60
|
export function IdentificationChallengeToJSON(json) {
|
|
@@ -79,5 +80,6 @@ export function IdentificationChallengeToJSONTyped(value, ignoreDiscriminator =
|
|
|
79
80
|
'primary_action': value['primaryAction'],
|
|
80
81
|
'sources': value['sources'] == null ? undefined : (value['sources'].map(LoginSourceToJSON)),
|
|
81
82
|
'show_source_labels': value['showSourceLabels'],
|
|
83
|
+
'enable_remember_me': value['enableRememberMe'],
|
|
82
84
|
};
|
|
83
85
|
}
|
|
@@ -125,6 +125,12 @@ export interface IdentificationStage {
|
|
|
125
125
|
* @memberof IdentificationStage
|
|
126
126
|
*/
|
|
127
127
|
pretendUserExists?: boolean;
|
|
128
|
+
/**
|
|
129
|
+
* Show the user the 'Remember me on this device' toggle, allowing repeat users to skip straight to entering their password.
|
|
130
|
+
* @type {boolean}
|
|
131
|
+
* @memberof IdentificationStage
|
|
132
|
+
*/
|
|
133
|
+
enableRememberMe?: boolean;
|
|
128
134
|
}
|
|
129
135
|
/**
|
|
130
136
|
* Check if a given object implements the IdentificationStage interface.
|
|
@@ -57,6 +57,7 @@ export function IdentificationStageFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
57
57
|
'sources': json['sources'] == null ? undefined : json['sources'],
|
|
58
58
|
'showSourceLabels': json['show_source_labels'] == null ? undefined : json['show_source_labels'],
|
|
59
59
|
'pretendUserExists': json['pretend_user_exists'] == null ? undefined : json['pretend_user_exists'],
|
|
60
|
+
'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
|
|
60
61
|
};
|
|
61
62
|
}
|
|
62
63
|
export function IdentificationStageToJSON(json) {
|
|
@@ -80,5 +81,6 @@ export function IdentificationStageToJSONTyped(value, ignoreDiscriminator = fals
|
|
|
80
81
|
'sources': value['sources'],
|
|
81
82
|
'show_source_labels': value['showSourceLabels'],
|
|
82
83
|
'pretend_user_exists': value['pretendUserExists'],
|
|
84
|
+
'enable_remember_me': value['enableRememberMe'],
|
|
83
85
|
};
|
|
84
86
|
}
|
|
@@ -95,6 +95,12 @@ export interface IdentificationStageRequest {
|
|
|
95
95
|
* @memberof IdentificationStageRequest
|
|
96
96
|
*/
|
|
97
97
|
pretendUserExists?: boolean;
|
|
98
|
+
/**
|
|
99
|
+
* Show the user the 'Remember me on this device' toggle, allowing repeat users to skip straight to entering their password.
|
|
100
|
+
* @type {boolean}
|
|
101
|
+
* @memberof IdentificationStageRequest
|
|
102
|
+
*/
|
|
103
|
+
enableRememberMe?: boolean;
|
|
98
104
|
}
|
|
99
105
|
/**
|
|
100
106
|
* Check if a given object implements the IdentificationStageRequest interface.
|
|
@@ -42,6 +42,7 @@ export function IdentificationStageRequestFromJSONTyped(json, ignoreDiscriminato
|
|
|
42
42
|
'sources': json['sources'] == null ? undefined : json['sources'],
|
|
43
43
|
'showSourceLabels': json['show_source_labels'] == null ? undefined : json['show_source_labels'],
|
|
44
44
|
'pretendUserExists': json['pretend_user_exists'] == null ? undefined : json['pretend_user_exists'],
|
|
45
|
+
'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
|
|
45
46
|
};
|
|
46
47
|
}
|
|
47
48
|
export function IdentificationStageRequestToJSON(json) {
|
|
@@ -65,5 +66,6 @@ export function IdentificationStageRequestToJSONTyped(value, ignoreDiscriminator
|
|
|
65
66
|
'sources': value['sources'],
|
|
66
67
|
'show_source_labels': value['showSourceLabels'],
|
|
67
68
|
'pretend_user_exists': value['pretendUserExists'],
|
|
69
|
+
'enable_remember_me': value['enableRememberMe'],
|
|
68
70
|
};
|
|
69
71
|
}
|
|
@@ -104,6 +104,7 @@ export declare const ModelEnum: {
|
|
|
104
104
|
readonly AuthentikCoreApplicationentitlement: "authentik_core.applicationentitlement";
|
|
105
105
|
readonly AuthentikCoreToken: "authentik_core.token";
|
|
106
106
|
readonly AuthentikEnterpriseLicense: "authentik_enterprise.license";
|
|
107
|
+
readonly AuthentikPoliciesUniquePasswordUniquepasswordpolicy: "authentik_policies_unique_password.uniquepasswordpolicy";
|
|
107
108
|
readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: "authentik_providers_google_workspace.googleworkspaceprovider";
|
|
108
109
|
readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: "authentik_providers_google_workspace.googleworkspaceprovidermapping";
|
|
109
110
|
readonly AuthentikProvidersMicrosoftEntraMicrosoftentraprovider: "authentik_providers_microsoft_entra.microsoftentraprovider";
|
|
@@ -106,6 +106,7 @@ export const ModelEnum = {
|
|
|
106
106
|
AuthentikCoreApplicationentitlement: 'authentik_core.applicationentitlement',
|
|
107
107
|
AuthentikCoreToken: 'authentik_core.token',
|
|
108
108
|
AuthentikEnterpriseLicense: 'authentik_enterprise.license',
|
|
109
|
+
AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
|
|
109
110
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
|
|
110
111
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
|
|
111
112
|
AuthentikProvidersMicrosoftEntraMicrosoftentraprovider: 'authentik_providers_microsoft_entra.microsoftentraprovider',
|
|
@@ -0,0 +1,40 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* authentik
|
|
3
|
+
* Making authentication simple.
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 2025.2.4
|
|
6
|
+
* Contact: hello@goauthentik.io
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
import type { Pagination } from './Pagination';
|
|
13
|
+
import type { UniquePasswordPolicy } from './UniquePasswordPolicy';
|
|
14
|
+
/**
|
|
15
|
+
*
|
|
16
|
+
* @export
|
|
17
|
+
* @interface PaginatedUniquePasswordPolicyList
|
|
18
|
+
*/
|
|
19
|
+
export interface PaginatedUniquePasswordPolicyList {
|
|
20
|
+
/**
|
|
21
|
+
*
|
|
22
|
+
* @type {Pagination}
|
|
23
|
+
* @memberof PaginatedUniquePasswordPolicyList
|
|
24
|
+
*/
|
|
25
|
+
pagination: Pagination;
|
|
26
|
+
/**
|
|
27
|
+
*
|
|
28
|
+
* @type {Array<UniquePasswordPolicy>}
|
|
29
|
+
* @memberof PaginatedUniquePasswordPolicyList
|
|
30
|
+
*/
|
|
31
|
+
results: Array<UniquePasswordPolicy>;
|
|
32
|
+
}
|
|
33
|
+
/**
|
|
34
|
+
* Check if a given object implements the PaginatedUniquePasswordPolicyList interface.
|
|
35
|
+
*/
|
|
36
|
+
export declare function instanceOfPaginatedUniquePasswordPolicyList(value: object): value is PaginatedUniquePasswordPolicyList;
|
|
37
|
+
export declare function PaginatedUniquePasswordPolicyListFromJSON(json: any): PaginatedUniquePasswordPolicyList;
|
|
38
|
+
export declare function PaginatedUniquePasswordPolicyListFromJSONTyped(json: any, ignoreDiscriminator: boolean): PaginatedUniquePasswordPolicyList;
|
|
39
|
+
export declare function PaginatedUniquePasswordPolicyListToJSON(json: any): PaginatedUniquePasswordPolicyList;
|
|
40
|
+
export declare function PaginatedUniquePasswordPolicyListToJSONTyped(value?: PaginatedUniquePasswordPolicyList | null, ignoreDiscriminator?: boolean): any;
|
|
@@ -0,0 +1,49 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* authentik
|
|
5
|
+
* Making authentication simple.
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 2025.2.4
|
|
8
|
+
* Contact: hello@goauthentik.io
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
import { PaginationFromJSON, PaginationToJSON, } from './Pagination';
|
|
15
|
+
import { UniquePasswordPolicyFromJSON, UniquePasswordPolicyToJSON, } from './UniquePasswordPolicy';
|
|
16
|
+
/**
|
|
17
|
+
* Check if a given object implements the PaginatedUniquePasswordPolicyList interface.
|
|
18
|
+
*/
|
|
19
|
+
export function instanceOfPaginatedUniquePasswordPolicyList(value) {
|
|
20
|
+
if (!('pagination' in value) || value['pagination'] === undefined)
|
|
21
|
+
return false;
|
|
22
|
+
if (!('results' in value) || value['results'] === undefined)
|
|
23
|
+
return false;
|
|
24
|
+
return true;
|
|
25
|
+
}
|
|
26
|
+
export function PaginatedUniquePasswordPolicyListFromJSON(json) {
|
|
27
|
+
return PaginatedUniquePasswordPolicyListFromJSONTyped(json, false);
|
|
28
|
+
}
|
|
29
|
+
export function PaginatedUniquePasswordPolicyListFromJSONTyped(json, ignoreDiscriminator) {
|
|
30
|
+
if (json == null) {
|
|
31
|
+
return json;
|
|
32
|
+
}
|
|
33
|
+
return {
|
|
34
|
+
'pagination': PaginationFromJSON(json['pagination']),
|
|
35
|
+
'results': (json['results'].map(UniquePasswordPolicyFromJSON)),
|
|
36
|
+
};
|
|
37
|
+
}
|
|
38
|
+
export function PaginatedUniquePasswordPolicyListToJSON(json) {
|
|
39
|
+
return PaginatedUniquePasswordPolicyListToJSONTyped(json, false);
|
|
40
|
+
}
|
|
41
|
+
export function PaginatedUniquePasswordPolicyListToJSONTyped(value, ignoreDiscriminator = false) {
|
|
42
|
+
if (value == null) {
|
|
43
|
+
return value;
|
|
44
|
+
}
|
|
45
|
+
return {
|
|
46
|
+
'pagination': PaginationToJSON(value['pagination']),
|
|
47
|
+
'results': (value['results'].map(UniquePasswordPolicyToJSON)),
|
|
48
|
+
};
|
|
49
|
+
}
|
|
@@ -95,6 +95,12 @@ export interface PatchedIdentificationStageRequest {
|
|
|
95
95
|
* @memberof PatchedIdentificationStageRequest
|
|
96
96
|
*/
|
|
97
97
|
pretendUserExists?: boolean;
|
|
98
|
+
/**
|
|
99
|
+
* Show the user the 'Remember me on this device' toggle, allowing repeat users to skip straight to entering their password.
|
|
100
|
+
* @type {boolean}
|
|
101
|
+
* @memberof PatchedIdentificationStageRequest
|
|
102
|
+
*/
|
|
103
|
+
enableRememberMe?: boolean;
|
|
98
104
|
}
|
|
99
105
|
/**
|
|
100
106
|
* Check if a given object implements the PatchedIdentificationStageRequest interface.
|
|
@@ -40,6 +40,7 @@ export function PatchedIdentificationStageRequestFromJSONTyped(json, ignoreDiscr
|
|
|
40
40
|
'sources': json['sources'] == null ? undefined : json['sources'],
|
|
41
41
|
'showSourceLabels': json['show_source_labels'] == null ? undefined : json['show_source_labels'],
|
|
42
42
|
'pretendUserExists': json['pretend_user_exists'] == null ? undefined : json['pretend_user_exists'],
|
|
43
|
+
'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
|
|
43
44
|
};
|
|
44
45
|
}
|
|
45
46
|
export function PatchedIdentificationStageRequestToJSON(json) {
|
|
@@ -63,5 +64,6 @@ export function PatchedIdentificationStageRequestToJSONTyped(value, ignoreDiscri
|
|
|
63
64
|
'sources': value['sources'],
|
|
64
65
|
'show_source_labels': value['showSourceLabels'],
|
|
65
66
|
'pretend_user_exists': value['pretendUserExists'],
|
|
67
|
+
'enable_remember_me': value['enableRememberMe'],
|
|
66
68
|
};
|
|
67
69
|
}
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* authentik
|
|
3
|
+
* Making authentication simple.
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 2025.2.4
|
|
6
|
+
* Contact: hello@goauthentik.io
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
/**
|
|
13
|
+
* Password Uniqueness Policy Serializer
|
|
14
|
+
* @export
|
|
15
|
+
* @interface PatchedUniquePasswordPolicyRequest
|
|
16
|
+
*/
|
|
17
|
+
export interface PatchedUniquePasswordPolicyRequest {
|
|
18
|
+
/**
|
|
19
|
+
*
|
|
20
|
+
* @type {string}
|
|
21
|
+
* @memberof PatchedUniquePasswordPolicyRequest
|
|
22
|
+
*/
|
|
23
|
+
name?: string;
|
|
24
|
+
/**
|
|
25
|
+
* When this option is enabled, all executions of this policy will be logged. By default, only execution errors are logged.
|
|
26
|
+
* @type {boolean}
|
|
27
|
+
* @memberof PatchedUniquePasswordPolicyRequest
|
|
28
|
+
*/
|
|
29
|
+
executionLogging?: boolean;
|
|
30
|
+
/**
|
|
31
|
+
* Field key to check, field keys defined in Prompt stages are available.
|
|
32
|
+
* @type {string}
|
|
33
|
+
* @memberof PatchedUniquePasswordPolicyRequest
|
|
34
|
+
*/
|
|
35
|
+
passwordField?: string;
|
|
36
|
+
/**
|
|
37
|
+
* Number of passwords to check against.
|
|
38
|
+
* @type {number}
|
|
39
|
+
* @memberof PatchedUniquePasswordPolicyRequest
|
|
40
|
+
*/
|
|
41
|
+
numHistoricalPasswords?: number;
|
|
42
|
+
}
|
|
43
|
+
/**
|
|
44
|
+
* Check if a given object implements the PatchedUniquePasswordPolicyRequest interface.
|
|
45
|
+
*/
|
|
46
|
+
export declare function instanceOfPatchedUniquePasswordPolicyRequest(value: object): value is PatchedUniquePasswordPolicyRequest;
|
|
47
|
+
export declare function PatchedUniquePasswordPolicyRequestFromJSON(json: any): PatchedUniquePasswordPolicyRequest;
|
|
48
|
+
export declare function PatchedUniquePasswordPolicyRequestFromJSONTyped(json: any, ignoreDiscriminator: boolean): PatchedUniquePasswordPolicyRequest;
|
|
49
|
+
export declare function PatchedUniquePasswordPolicyRequestToJSON(json: any): PatchedUniquePasswordPolicyRequest;
|
|
50
|
+
export declare function PatchedUniquePasswordPolicyRequestToJSONTyped(value?: PatchedUniquePasswordPolicyRequest | null, ignoreDiscriminator?: boolean): any;
|