@goauthentik/api 2025.2.4-1744808430 → 2025.2.4-1745325566

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (67) hide show
  1. package/.openapi-generator/FILES +4 -0
  2. package/dist/apis/PoliciesApi.d.ts +90 -1
  3. package/dist/apis/PoliciesApi.js +283 -0
  4. package/dist/apis/RbacApi.d.ts +2 -0
  5. package/dist/apis/RbacApi.js +2 -0
  6. package/dist/esm/apis/PoliciesApi.d.ts +90 -1
  7. package/dist/esm/apis/PoliciesApi.js +284 -1
  8. package/dist/esm/apis/RbacApi.d.ts +2 -0
  9. package/dist/esm/apis/RbacApi.js +2 -0
  10. package/dist/esm/models/AppEnum.d.ts +1 -0
  11. package/dist/esm/models/AppEnum.js +1 -0
  12. package/dist/esm/models/IdentificationChallenge.d.ts +6 -0
  13. package/dist/esm/models/IdentificationChallenge.js +2 -0
  14. package/dist/esm/models/IdentificationStage.d.ts +6 -0
  15. package/dist/esm/models/IdentificationStage.js +2 -0
  16. package/dist/esm/models/IdentificationStageRequest.d.ts +6 -0
  17. package/dist/esm/models/IdentificationStageRequest.js +2 -0
  18. package/dist/esm/models/ModelEnum.d.ts +1 -0
  19. package/dist/esm/models/ModelEnum.js +1 -0
  20. package/dist/esm/models/PaginatedUniquePasswordPolicyList.d.ts +40 -0
  21. package/dist/esm/models/PaginatedUniquePasswordPolicyList.js +49 -0
  22. package/dist/esm/models/PatchedIdentificationStageRequest.d.ts +6 -0
  23. package/dist/esm/models/PatchedIdentificationStageRequest.js +2 -0
  24. package/dist/esm/models/PatchedUniquePasswordPolicyRequest.d.ts +50 -0
  25. package/dist/esm/models/PatchedUniquePasswordPolicyRequest.js +47 -0
  26. package/dist/esm/models/UniquePasswordPolicy.d.ts +86 -0
  27. package/dist/esm/models/UniquePasswordPolicy.js +67 -0
  28. package/dist/esm/models/UniquePasswordPolicyRequest.d.ts +50 -0
  29. package/dist/esm/models/UniquePasswordPolicyRequest.js +49 -0
  30. package/dist/esm/models/index.d.ts +4 -0
  31. package/dist/esm/models/index.js +4 -0
  32. package/dist/models/AppEnum.d.ts +1 -0
  33. package/dist/models/AppEnum.js +1 -0
  34. package/dist/models/IdentificationChallenge.d.ts +6 -0
  35. package/dist/models/IdentificationChallenge.js +2 -0
  36. package/dist/models/IdentificationStage.d.ts +6 -0
  37. package/dist/models/IdentificationStage.js +2 -0
  38. package/dist/models/IdentificationStageRequest.d.ts +6 -0
  39. package/dist/models/IdentificationStageRequest.js +2 -0
  40. package/dist/models/ModelEnum.d.ts +1 -0
  41. package/dist/models/ModelEnum.js +1 -0
  42. package/dist/models/PaginatedUniquePasswordPolicyList.d.ts +40 -0
  43. package/dist/models/PaginatedUniquePasswordPolicyList.js +56 -0
  44. package/dist/models/PatchedIdentificationStageRequest.d.ts +6 -0
  45. package/dist/models/PatchedIdentificationStageRequest.js +2 -0
  46. package/dist/models/PatchedUniquePasswordPolicyRequest.d.ts +50 -0
  47. package/dist/models/PatchedUniquePasswordPolicyRequest.js +54 -0
  48. package/dist/models/UniquePasswordPolicy.d.ts +86 -0
  49. package/dist/models/UniquePasswordPolicy.js +74 -0
  50. package/dist/models/UniquePasswordPolicyRequest.d.ts +50 -0
  51. package/dist/models/UniquePasswordPolicyRequest.js +56 -0
  52. package/dist/models/index.d.ts +4 -0
  53. package/dist/models/index.js +4 -0
  54. package/package.json +1 -1
  55. package/src/apis/PoliciesApi.ts +391 -0
  56. package/src/apis/RbacApi.ts +2 -0
  57. package/src/models/AppEnum.ts +1 -0
  58. package/src/models/IdentificationChallenge.ts +8 -0
  59. package/src/models/IdentificationStage.ts +8 -0
  60. package/src/models/IdentificationStageRequest.ts +8 -0
  61. package/src/models/ModelEnum.ts +1 -0
  62. package/src/models/PaginatedUniquePasswordPolicyList.ts +90 -0
  63. package/src/models/PatchedIdentificationStageRequest.ts +8 -0
  64. package/src/models/PatchedUniquePasswordPolicyRequest.ts +89 -0
  65. package/src/models/UniquePasswordPolicy.ts +138 -0
  66. package/src/models/UniquePasswordPolicyRequest.ts +90 -0
  67. package/src/models/index.ts +4 -0
@@ -36,6 +36,7 @@ import type {
36
36
  PaginatedPolicyList,
37
37
  PaginatedReputationList,
38
38
  PaginatedReputationPolicyList,
39
+ PaginatedUniquePasswordPolicyList,
39
40
  PasswordExpiryPolicy,
40
41
  PasswordExpiryPolicyRequest,
41
42
  PasswordPolicy,
@@ -48,6 +49,7 @@ import type {
48
49
  PatchedPasswordPolicyRequest,
49
50
  PatchedPolicyBindingRequest,
50
51
  PatchedReputationPolicyRequest,
52
+ PatchedUniquePasswordPolicyRequest,
51
53
  Policy,
52
54
  PolicyBinding,
53
55
  PolicyBindingRequest,
@@ -57,6 +59,8 @@ import type {
57
59
  ReputationPolicy,
58
60
  ReputationPolicyRequest,
59
61
  TypeCreate,
62
+ UniquePasswordPolicy,
63
+ UniquePasswordPolicyRequest,
60
64
  UsedBy,
61
65
  ValidationError,
62
66
  } from '../models/index';
@@ -103,6 +107,8 @@ import {
103
107
  PaginatedReputationListToJSON,
104
108
  PaginatedReputationPolicyListFromJSON,
105
109
  PaginatedReputationPolicyListToJSON,
110
+ PaginatedUniquePasswordPolicyListFromJSON,
111
+ PaginatedUniquePasswordPolicyListToJSON,
106
112
  PasswordExpiryPolicyFromJSON,
107
113
  PasswordExpiryPolicyToJSON,
108
114
  PasswordExpiryPolicyRequestFromJSON,
@@ -127,6 +133,8 @@ import {
127
133
  PatchedPolicyBindingRequestToJSON,
128
134
  PatchedReputationPolicyRequestFromJSON,
129
135
  PatchedReputationPolicyRequestToJSON,
136
+ PatchedUniquePasswordPolicyRequestFromJSON,
137
+ PatchedUniquePasswordPolicyRequestToJSON,
130
138
  PolicyFromJSON,
131
139
  PolicyToJSON,
132
140
  PolicyBindingFromJSON,
@@ -145,6 +153,10 @@ import {
145
153
  ReputationPolicyRequestToJSON,
146
154
  TypeCreateFromJSON,
147
155
  TypeCreateToJSON,
156
+ UniquePasswordPolicyFromJSON,
157
+ UniquePasswordPolicyToJSON,
158
+ UniquePasswordPolicyRequestFromJSON,
159
+ UniquePasswordPolicyRequestToJSON,
148
160
  UsedByFromJSON,
149
161
  UsedByToJSON,
150
162
  ValidationErrorFromJSON,
@@ -528,6 +540,46 @@ export interface PoliciesReputationUsedByListRequest {
528
540
  policyUuid: string;
529
541
  }
530
542
 
543
+ export interface PoliciesUniquePasswordCreateRequest {
544
+ uniquePasswordPolicyRequest: UniquePasswordPolicyRequest;
545
+ }
546
+
547
+ export interface PoliciesUniquePasswordDestroyRequest {
548
+ policyUuid: string;
549
+ }
550
+
551
+ export interface PoliciesUniquePasswordListRequest {
552
+ created?: Date;
553
+ executionLogging?: boolean;
554
+ lastUpdated?: Date;
555
+ name?: string;
556
+ numHistoricalPasswords?: number;
557
+ ordering?: string;
558
+ page?: number;
559
+ pageSize?: number;
560
+ passwordField?: string;
561
+ policyUuid?: string;
562
+ search?: string;
563
+ }
564
+
565
+ export interface PoliciesUniquePasswordPartialUpdateRequest {
566
+ policyUuid: string;
567
+ patchedUniquePasswordPolicyRequest?: PatchedUniquePasswordPolicyRequest;
568
+ }
569
+
570
+ export interface PoliciesUniquePasswordRetrieveRequest {
571
+ policyUuid: string;
572
+ }
573
+
574
+ export interface PoliciesUniquePasswordUpdateRequest {
575
+ policyUuid: string;
576
+ uniquePasswordPolicyRequest: UniquePasswordPolicyRequest;
577
+ }
578
+
579
+ export interface PoliciesUniquePasswordUsedByListRequest {
580
+ policyUuid: string;
581
+ }
582
+
531
583
  /**
532
584
  *
533
585
  */
@@ -3831,6 +3883,345 @@ export class PoliciesApi extends runtime.BaseAPI {
3831
3883
  return await response.value();
3832
3884
  }
3833
3885
 
3886
+ /**
3887
+ * Password Uniqueness Policy Viewset
3888
+ */
3889
+ async policiesUniquePasswordCreateRaw(requestParameters: PoliciesUniquePasswordCreateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<UniquePasswordPolicy>> {
3890
+ if (requestParameters['uniquePasswordPolicyRequest'] == null) {
3891
+ throw new runtime.RequiredError(
3892
+ 'uniquePasswordPolicyRequest',
3893
+ 'Required parameter "uniquePasswordPolicyRequest" was null or undefined when calling policiesUniquePasswordCreate().'
3894
+ );
3895
+ }
3896
+
3897
+ const queryParameters: any = {};
3898
+
3899
+ const headerParameters: runtime.HTTPHeaders = {};
3900
+
3901
+ headerParameters['Content-Type'] = 'application/json';
3902
+
3903
+ if (this.configuration && this.configuration.accessToken) {
3904
+ const token = this.configuration.accessToken;
3905
+ const tokenString = await token("authentik", []);
3906
+
3907
+ if (tokenString) {
3908
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
3909
+ }
3910
+ }
3911
+ const response = await this.request({
3912
+ path: `/policies/unique_password/`,
3913
+ method: 'POST',
3914
+ headers: headerParameters,
3915
+ query: queryParameters,
3916
+ body: UniquePasswordPolicyRequestToJSON(requestParameters['uniquePasswordPolicyRequest']),
3917
+ }, initOverrides);
3918
+
3919
+ return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
3920
+ }
3921
+
3922
+ /**
3923
+ * Password Uniqueness Policy Viewset
3924
+ */
3925
+ async policiesUniquePasswordCreate(requestParameters: PoliciesUniquePasswordCreateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<UniquePasswordPolicy> {
3926
+ const response = await this.policiesUniquePasswordCreateRaw(requestParameters, initOverrides);
3927
+ return await response.value();
3928
+ }
3929
+
3930
+ /**
3931
+ * Password Uniqueness Policy Viewset
3932
+ */
3933
+ async policiesUniquePasswordDestroyRaw(requestParameters: PoliciesUniquePasswordDestroyRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<void>> {
3934
+ if (requestParameters['policyUuid'] == null) {
3935
+ throw new runtime.RequiredError(
3936
+ 'policyUuid',
3937
+ 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordDestroy().'
3938
+ );
3939
+ }
3940
+
3941
+ const queryParameters: any = {};
3942
+
3943
+ const headerParameters: runtime.HTTPHeaders = {};
3944
+
3945
+ if (this.configuration && this.configuration.accessToken) {
3946
+ const token = this.configuration.accessToken;
3947
+ const tokenString = await token("authentik", []);
3948
+
3949
+ if (tokenString) {
3950
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
3951
+ }
3952
+ }
3953
+ const response = await this.request({
3954
+ path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
3955
+ method: 'DELETE',
3956
+ headers: headerParameters,
3957
+ query: queryParameters,
3958
+ }, initOverrides);
3959
+
3960
+ return new runtime.VoidApiResponse(response);
3961
+ }
3962
+
3963
+ /**
3964
+ * Password Uniqueness Policy Viewset
3965
+ */
3966
+ async policiesUniquePasswordDestroy(requestParameters: PoliciesUniquePasswordDestroyRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<void> {
3967
+ await this.policiesUniquePasswordDestroyRaw(requestParameters, initOverrides);
3968
+ }
3969
+
3970
+ /**
3971
+ * Password Uniqueness Policy Viewset
3972
+ */
3973
+ async policiesUniquePasswordListRaw(requestParameters: PoliciesUniquePasswordListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<PaginatedUniquePasswordPolicyList>> {
3974
+ const queryParameters: any = {};
3975
+
3976
+ if (requestParameters['created'] != null) {
3977
+ queryParameters['created'] = (requestParameters['created'] as any).toISOString();
3978
+ }
3979
+
3980
+ if (requestParameters['executionLogging'] != null) {
3981
+ queryParameters['execution_logging'] = requestParameters['executionLogging'];
3982
+ }
3983
+
3984
+ if (requestParameters['lastUpdated'] != null) {
3985
+ queryParameters['last_updated'] = (requestParameters['lastUpdated'] as any).toISOString();
3986
+ }
3987
+
3988
+ if (requestParameters['name'] != null) {
3989
+ queryParameters['name'] = requestParameters['name'];
3990
+ }
3991
+
3992
+ if (requestParameters['numHistoricalPasswords'] != null) {
3993
+ queryParameters['num_historical_passwords'] = requestParameters['numHistoricalPasswords'];
3994
+ }
3995
+
3996
+ if (requestParameters['ordering'] != null) {
3997
+ queryParameters['ordering'] = requestParameters['ordering'];
3998
+ }
3999
+
4000
+ if (requestParameters['page'] != null) {
4001
+ queryParameters['page'] = requestParameters['page'];
4002
+ }
4003
+
4004
+ if (requestParameters['pageSize'] != null) {
4005
+ queryParameters['page_size'] = requestParameters['pageSize'];
4006
+ }
4007
+
4008
+ if (requestParameters['passwordField'] != null) {
4009
+ queryParameters['password_field'] = requestParameters['passwordField'];
4010
+ }
4011
+
4012
+ if (requestParameters['policyUuid'] != null) {
4013
+ queryParameters['policy_uuid'] = requestParameters['policyUuid'];
4014
+ }
4015
+
4016
+ if (requestParameters['search'] != null) {
4017
+ queryParameters['search'] = requestParameters['search'];
4018
+ }
4019
+
4020
+ const headerParameters: runtime.HTTPHeaders = {};
4021
+
4022
+ if (this.configuration && this.configuration.accessToken) {
4023
+ const token = this.configuration.accessToken;
4024
+ const tokenString = await token("authentik", []);
4025
+
4026
+ if (tokenString) {
4027
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
4028
+ }
4029
+ }
4030
+ const response = await this.request({
4031
+ path: `/policies/unique_password/`,
4032
+ method: 'GET',
4033
+ headers: headerParameters,
4034
+ query: queryParameters,
4035
+ }, initOverrides);
4036
+
4037
+ return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedUniquePasswordPolicyListFromJSON(jsonValue));
4038
+ }
4039
+
4040
+ /**
4041
+ * Password Uniqueness Policy Viewset
4042
+ */
4043
+ async policiesUniquePasswordList(requestParameters: PoliciesUniquePasswordListRequest = {}, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<PaginatedUniquePasswordPolicyList> {
4044
+ const response = await this.policiesUniquePasswordListRaw(requestParameters, initOverrides);
4045
+ return await response.value();
4046
+ }
4047
+
4048
+ /**
4049
+ * Password Uniqueness Policy Viewset
4050
+ */
4051
+ async policiesUniquePasswordPartialUpdateRaw(requestParameters: PoliciesUniquePasswordPartialUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<UniquePasswordPolicy>> {
4052
+ if (requestParameters['policyUuid'] == null) {
4053
+ throw new runtime.RequiredError(
4054
+ 'policyUuid',
4055
+ 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordPartialUpdate().'
4056
+ );
4057
+ }
4058
+
4059
+ const queryParameters: any = {};
4060
+
4061
+ const headerParameters: runtime.HTTPHeaders = {};
4062
+
4063
+ headerParameters['Content-Type'] = 'application/json';
4064
+
4065
+ if (this.configuration && this.configuration.accessToken) {
4066
+ const token = this.configuration.accessToken;
4067
+ const tokenString = await token("authentik", []);
4068
+
4069
+ if (tokenString) {
4070
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
4071
+ }
4072
+ }
4073
+ const response = await this.request({
4074
+ path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
4075
+ method: 'PATCH',
4076
+ headers: headerParameters,
4077
+ query: queryParameters,
4078
+ body: PatchedUniquePasswordPolicyRequestToJSON(requestParameters['patchedUniquePasswordPolicyRequest']),
4079
+ }, initOverrides);
4080
+
4081
+ return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
4082
+ }
4083
+
4084
+ /**
4085
+ * Password Uniqueness Policy Viewset
4086
+ */
4087
+ async policiesUniquePasswordPartialUpdate(requestParameters: PoliciesUniquePasswordPartialUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<UniquePasswordPolicy> {
4088
+ const response = await this.policiesUniquePasswordPartialUpdateRaw(requestParameters, initOverrides);
4089
+ return await response.value();
4090
+ }
4091
+
4092
+ /**
4093
+ * Password Uniqueness Policy Viewset
4094
+ */
4095
+ async policiesUniquePasswordRetrieveRaw(requestParameters: PoliciesUniquePasswordRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<UniquePasswordPolicy>> {
4096
+ if (requestParameters['policyUuid'] == null) {
4097
+ throw new runtime.RequiredError(
4098
+ 'policyUuid',
4099
+ 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordRetrieve().'
4100
+ );
4101
+ }
4102
+
4103
+ const queryParameters: any = {};
4104
+
4105
+ const headerParameters: runtime.HTTPHeaders = {};
4106
+
4107
+ if (this.configuration && this.configuration.accessToken) {
4108
+ const token = this.configuration.accessToken;
4109
+ const tokenString = await token("authentik", []);
4110
+
4111
+ if (tokenString) {
4112
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
4113
+ }
4114
+ }
4115
+ const response = await this.request({
4116
+ path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
4117
+ method: 'GET',
4118
+ headers: headerParameters,
4119
+ query: queryParameters,
4120
+ }, initOverrides);
4121
+
4122
+ return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
4123
+ }
4124
+
4125
+ /**
4126
+ * Password Uniqueness Policy Viewset
4127
+ */
4128
+ async policiesUniquePasswordRetrieve(requestParameters: PoliciesUniquePasswordRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<UniquePasswordPolicy> {
4129
+ const response = await this.policiesUniquePasswordRetrieveRaw(requestParameters, initOverrides);
4130
+ return await response.value();
4131
+ }
4132
+
4133
+ /**
4134
+ * Password Uniqueness Policy Viewset
4135
+ */
4136
+ async policiesUniquePasswordUpdateRaw(requestParameters: PoliciesUniquePasswordUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<UniquePasswordPolicy>> {
4137
+ if (requestParameters['policyUuid'] == null) {
4138
+ throw new runtime.RequiredError(
4139
+ 'policyUuid',
4140
+ 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordUpdate().'
4141
+ );
4142
+ }
4143
+
4144
+ if (requestParameters['uniquePasswordPolicyRequest'] == null) {
4145
+ throw new runtime.RequiredError(
4146
+ 'uniquePasswordPolicyRequest',
4147
+ 'Required parameter "uniquePasswordPolicyRequest" was null or undefined when calling policiesUniquePasswordUpdate().'
4148
+ );
4149
+ }
4150
+
4151
+ const queryParameters: any = {};
4152
+
4153
+ const headerParameters: runtime.HTTPHeaders = {};
4154
+
4155
+ headerParameters['Content-Type'] = 'application/json';
4156
+
4157
+ if (this.configuration && this.configuration.accessToken) {
4158
+ const token = this.configuration.accessToken;
4159
+ const tokenString = await token("authentik", []);
4160
+
4161
+ if (tokenString) {
4162
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
4163
+ }
4164
+ }
4165
+ const response = await this.request({
4166
+ path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
4167
+ method: 'PUT',
4168
+ headers: headerParameters,
4169
+ query: queryParameters,
4170
+ body: UniquePasswordPolicyRequestToJSON(requestParameters['uniquePasswordPolicyRequest']),
4171
+ }, initOverrides);
4172
+
4173
+ return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
4174
+ }
4175
+
4176
+ /**
4177
+ * Password Uniqueness Policy Viewset
4178
+ */
4179
+ async policiesUniquePasswordUpdate(requestParameters: PoliciesUniquePasswordUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<UniquePasswordPolicy> {
4180
+ const response = await this.policiesUniquePasswordUpdateRaw(requestParameters, initOverrides);
4181
+ return await response.value();
4182
+ }
4183
+
4184
+ /**
4185
+ * Get a list of all objects that use this object
4186
+ */
4187
+ async policiesUniquePasswordUsedByListRaw(requestParameters: PoliciesUniquePasswordUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Array<UsedBy>>> {
4188
+ if (requestParameters['policyUuid'] == null) {
4189
+ throw new runtime.RequiredError(
4190
+ 'policyUuid',
4191
+ 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordUsedByList().'
4192
+ );
4193
+ }
4194
+
4195
+ const queryParameters: any = {};
4196
+
4197
+ const headerParameters: runtime.HTTPHeaders = {};
4198
+
4199
+ if (this.configuration && this.configuration.accessToken) {
4200
+ const token = this.configuration.accessToken;
4201
+ const tokenString = await token("authentik", []);
4202
+
4203
+ if (tokenString) {
4204
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
4205
+ }
4206
+ }
4207
+ const response = await this.request({
4208
+ path: `/policies/unique_password/{policy_uuid}/used_by/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
4209
+ method: 'GET',
4210
+ headers: headerParameters,
4211
+ query: queryParameters,
4212
+ }, initOverrides);
4213
+
4214
+ return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(UsedByFromJSON));
4215
+ }
4216
+
4217
+ /**
4218
+ * Get a list of all objects that use this object
4219
+ */
4220
+ async policiesUniquePasswordUsedByList(requestParameters: PoliciesUniquePasswordUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>> {
4221
+ const response = await this.policiesUniquePasswordUsedByListRaw(requestParameters, initOverrides);
4222
+ return await response.value();
4223
+ }
4224
+
3834
4225
  }
3835
4226
 
3836
4227
  /**
@@ -1828,6 +1828,7 @@ export const RbacPermissionsAssignedByRolesListModelEnum = {
1828
1828
  AuthentikPoliciesGeoipGeoippolicy: 'authentik_policies_geoip.geoippolicy',
1829
1829
  AuthentikPoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
1830
1830
  AuthentikPoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
1831
+ AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
1831
1832
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
1832
1833
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
1833
1834
  AuthentikProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
@@ -1937,6 +1938,7 @@ export const RbacPermissionsAssignedByUsersListModelEnum = {
1937
1938
  AuthentikPoliciesGeoipGeoippolicy: 'authentik_policies_geoip.geoippolicy',
1938
1939
  AuthentikPoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
1939
1940
  AuthentikPoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
1941
+ AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
1940
1942
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
1941
1943
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
1942
1944
  AuthentikProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
@@ -74,6 +74,7 @@ export const AppEnum = {
74
74
  AuthentikCore: 'authentik.core',
75
75
  AuthentikEnterprise: 'authentik.enterprise',
76
76
  AuthentikEnterpriseAudit: 'authentik.enterprise.audit',
77
+ AuthentikEnterprisePoliciesUniquePassword: 'authentik.enterprise.policies.unique_password',
77
78
  AuthentikEnterpriseProvidersGoogleWorkspace: 'authentik.enterprise.providers.google_workspace',
78
79
  AuthentikEnterpriseProvidersMicrosoftEntra: 'authentik.enterprise.providers.microsoft_entra',
79
80
  AuthentikEnterpriseProvidersSsf: 'authentik.enterprise.providers.ssf',
@@ -145,6 +145,12 @@ export interface IdentificationChallenge {
145
145
  * @memberof IdentificationChallenge
146
146
  */
147
147
  showSourceLabels: boolean;
148
+ /**
149
+ *
150
+ * @type {boolean}
151
+ * @memberof IdentificationChallenge
152
+ */
153
+ enableRememberMe?: boolean;
148
154
  }
149
155
 
150
156
 
@@ -186,6 +192,7 @@ export function IdentificationChallengeFromJSONTyped(json: any, ignoreDiscrimina
186
192
  'primaryAction': json['primary_action'],
187
193
  'sources': json['sources'] == null ? undefined : ((json['sources'] as Array<any>).map(LoginSourceFromJSON)),
188
194
  'showSourceLabels': json['show_source_labels'],
195
+ 'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
189
196
  };
190
197
  }
191
198
 
@@ -215,6 +222,7 @@ export function IdentificationChallengeToJSONTyped(value?: IdentificationChallen
215
222
  'primary_action': value['primaryAction'],
216
223
  'sources': value['sources'] == null ? undefined : ((value['sources'] as Array<any>).map(LoginSourceToJSON)),
217
224
  'show_source_labels': value['showSourceLabels'],
225
+ 'enable_remember_me': value['enableRememberMe'],
218
226
  };
219
227
  }
220
228
 
@@ -142,6 +142,12 @@ export interface IdentificationStage {
142
142
  * @memberof IdentificationStage
143
143
  */
144
144
  pretendUserExists?: boolean;
145
+ /**
146
+ * Show the user the 'Remember me on this device' toggle, allowing repeat users to skip straight to entering their password.
147
+ * @type {boolean}
148
+ * @memberof IdentificationStage
149
+ */
150
+ enableRememberMe?: boolean;
145
151
  }
146
152
 
147
153
  /**
@@ -185,6 +191,7 @@ export function IdentificationStageFromJSONTyped(json: any, ignoreDiscriminator:
185
191
  'sources': json['sources'] == null ? undefined : json['sources'],
186
192
  'showSourceLabels': json['show_source_labels'] == null ? undefined : json['show_source_labels'],
187
193
  'pretendUserExists': json['pretend_user_exists'] == null ? undefined : json['pretend_user_exists'],
194
+ 'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
188
195
  };
189
196
  }
190
197
 
@@ -212,6 +219,7 @@ export function IdentificationStageToJSONTyped(value?: Omit<IdentificationStage,
212
219
  'sources': value['sources'],
213
220
  'show_source_labels': value['showSourceLabels'],
214
221
  'pretend_user_exists': value['pretendUserExists'],
222
+ 'enable_remember_me': value['enableRememberMe'],
215
223
  };
216
224
  }
217
225
 
@@ -112,6 +112,12 @@ export interface IdentificationStageRequest {
112
112
  * @memberof IdentificationStageRequest
113
113
  */
114
114
  pretendUserExists?: boolean;
115
+ /**
116
+ * Show the user the 'Remember me on this device' toggle, allowing repeat users to skip straight to entering their password.
117
+ * @type {boolean}
118
+ * @memberof IdentificationStageRequest
119
+ */
120
+ enableRememberMe?: boolean;
115
121
  }
116
122
 
117
123
  /**
@@ -145,6 +151,7 @@ export function IdentificationStageRequestFromJSONTyped(json: any, ignoreDiscrim
145
151
  'sources': json['sources'] == null ? undefined : json['sources'],
146
152
  'showSourceLabels': json['show_source_labels'] == null ? undefined : json['show_source_labels'],
147
153
  'pretendUserExists': json['pretend_user_exists'] == null ? undefined : json['pretend_user_exists'],
154
+ 'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
148
155
  };
149
156
  }
150
157
 
@@ -172,6 +179,7 @@ export function IdentificationStageRequestToJSONTyped(value?: IdentificationStag
172
179
  'sources': value['sources'],
173
180
  'show_source_labels': value['showSourceLabels'],
174
181
  'pretend_user_exists': value['pretendUserExists'],
182
+ 'enable_remember_me': value['enableRememberMe'],
175
183
  };
176
184
  }
177
185
 
@@ -108,6 +108,7 @@ export const ModelEnum = {
108
108
  AuthentikCoreApplicationentitlement: 'authentik_core.applicationentitlement',
109
109
  AuthentikCoreToken: 'authentik_core.token',
110
110
  AuthentikEnterpriseLicense: 'authentik_enterprise.license',
111
+ AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
111
112
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
112
113
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
113
114
  AuthentikProvidersMicrosoftEntraMicrosoftentraprovider: 'authentik_providers_microsoft_entra.microsoftentraprovider',
@@ -0,0 +1,90 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2025.2.4
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+
15
+ import { mapValues } from '../runtime';
16
+ import type { Pagination } from './Pagination';
17
+ import {
18
+ PaginationFromJSON,
19
+ PaginationFromJSONTyped,
20
+ PaginationToJSON,
21
+ PaginationToJSONTyped,
22
+ } from './Pagination';
23
+ import type { UniquePasswordPolicy } from './UniquePasswordPolicy';
24
+ import {
25
+ UniquePasswordPolicyFromJSON,
26
+ UniquePasswordPolicyFromJSONTyped,
27
+ UniquePasswordPolicyToJSON,
28
+ UniquePasswordPolicyToJSONTyped,
29
+ } from './UniquePasswordPolicy';
30
+
31
+ /**
32
+ *
33
+ * @export
34
+ * @interface PaginatedUniquePasswordPolicyList
35
+ */
36
+ export interface PaginatedUniquePasswordPolicyList {
37
+ /**
38
+ *
39
+ * @type {Pagination}
40
+ * @memberof PaginatedUniquePasswordPolicyList
41
+ */
42
+ pagination: Pagination;
43
+ /**
44
+ *
45
+ * @type {Array<UniquePasswordPolicy>}
46
+ * @memberof PaginatedUniquePasswordPolicyList
47
+ */
48
+ results: Array<UniquePasswordPolicy>;
49
+ }
50
+
51
+ /**
52
+ * Check if a given object implements the PaginatedUniquePasswordPolicyList interface.
53
+ */
54
+ export function instanceOfPaginatedUniquePasswordPolicyList(value: object): value is PaginatedUniquePasswordPolicyList {
55
+ if (!('pagination' in value) || value['pagination'] === undefined) return false;
56
+ if (!('results' in value) || value['results'] === undefined) return false;
57
+ return true;
58
+ }
59
+
60
+ export function PaginatedUniquePasswordPolicyListFromJSON(json: any): PaginatedUniquePasswordPolicyList {
61
+ return PaginatedUniquePasswordPolicyListFromJSONTyped(json, false);
62
+ }
63
+
64
+ export function PaginatedUniquePasswordPolicyListFromJSONTyped(json: any, ignoreDiscriminator: boolean): PaginatedUniquePasswordPolicyList {
65
+ if (json == null) {
66
+ return json;
67
+ }
68
+ return {
69
+
70
+ 'pagination': PaginationFromJSON(json['pagination']),
71
+ 'results': ((json['results'] as Array<any>).map(UniquePasswordPolicyFromJSON)),
72
+ };
73
+ }
74
+
75
+ export function PaginatedUniquePasswordPolicyListToJSON(json: any): PaginatedUniquePasswordPolicyList {
76
+ return PaginatedUniquePasswordPolicyListToJSONTyped(json, false);
77
+ }
78
+
79
+ export function PaginatedUniquePasswordPolicyListToJSONTyped(value?: PaginatedUniquePasswordPolicyList | null, ignoreDiscriminator: boolean = false): any {
80
+ if (value == null) {
81
+ return value;
82
+ }
83
+
84
+ return {
85
+
86
+ 'pagination': PaginationToJSON(value['pagination']),
87
+ 'results': ((value['results'] as Array<any>).map(UniquePasswordPolicyToJSON)),
88
+ };
89
+ }
90
+
@@ -112,6 +112,12 @@ export interface PatchedIdentificationStageRequest {
112
112
  * @memberof PatchedIdentificationStageRequest
113
113
  */
114
114
  pretendUserExists?: boolean;
115
+ /**
116
+ * Show the user the 'Remember me on this device' toggle, allowing repeat users to skip straight to entering their password.
117
+ * @type {boolean}
118
+ * @memberof PatchedIdentificationStageRequest
119
+ */
120
+ enableRememberMe?: boolean;
115
121
  }
116
122
 
117
123
  /**
@@ -144,6 +150,7 @@ export function PatchedIdentificationStageRequestFromJSONTyped(json: any, ignore
144
150
  'sources': json['sources'] == null ? undefined : json['sources'],
145
151
  'showSourceLabels': json['show_source_labels'] == null ? undefined : json['show_source_labels'],
146
152
  'pretendUserExists': json['pretend_user_exists'] == null ? undefined : json['pretend_user_exists'],
153
+ 'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
147
154
  };
148
155
  }
149
156
 
@@ -171,6 +178,7 @@ export function PatchedIdentificationStageRequestToJSONTyped(value?: PatchedIden
171
178
  'sources': value['sources'],
172
179
  'show_source_labels': value['showSourceLabels'],
173
180
  'pretend_user_exists': value['pretendUserExists'],
181
+ 'enable_remember_me': value['enableRememberMe'],
174
182
  };
175
183
  }
176
184