models

package
v0.0.0-...-7b99a6d Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jan 29, 2024 License: Apache-2.0 Imports: 7 Imported by: 0

Documentation ¶

Index ¶

Constants ¶

View Source
const (

	// AccessRequestDataTokenEndpointAuthnMethodClientSecretBasic captures enum value "client_secret_basic"
	AccessRequestDataTokenEndpointAuthnMethodClientSecretBasic string = "client_secret_basic"

	// AccessRequestDataTokenEndpointAuthnMethodClientSecretPost captures enum value "client_secret_post"
	AccessRequestDataTokenEndpointAuthnMethodClientSecretPost string = "client_secret_post"

	// AccessRequestDataTokenEndpointAuthnMethodClientSecretJwt captures enum value "client_secret_jwt"
	AccessRequestDataTokenEndpointAuthnMethodClientSecretJwt string = "client_secret_jwt"

	// AccessRequestDataTokenEndpointAuthnMethodPrivateKeyJwt captures enum value "private_key_jwt"
	AccessRequestDataTokenEndpointAuthnMethodPrivateKeyJwt string = "private_key_jwt"

	// AccessRequestDataTokenEndpointAuthnMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	AccessRequestDataTokenEndpointAuthnMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// AccessRequestDataTokenEndpointAuthnMethodTLSClientAuth captures enum value "tls_client_auth"
	AccessRequestDataTokenEndpointAuthnMethodTLSClientAuth string = "tls_client_auth"

	// AccessRequestDataTokenEndpointAuthnMethodNone captures enum value "none"
	AccessRequestDataTokenEndpointAuthnMethodNone string = "none"
)
View Source
const (

	// AccessRequestDataWithErrorTokenEndpointAuthnMethodClientSecretBasic captures enum value "client_secret_basic"
	AccessRequestDataWithErrorTokenEndpointAuthnMethodClientSecretBasic string = "client_secret_basic"

	// AccessRequestDataWithErrorTokenEndpointAuthnMethodClientSecretPost captures enum value "client_secret_post"
	AccessRequestDataWithErrorTokenEndpointAuthnMethodClientSecretPost string = "client_secret_post"

	// AccessRequestDataWithErrorTokenEndpointAuthnMethodClientSecretJwt captures enum value "client_secret_jwt"
	AccessRequestDataWithErrorTokenEndpointAuthnMethodClientSecretJwt string = "client_secret_jwt"

	// AccessRequestDataWithErrorTokenEndpointAuthnMethodPrivateKeyJwt captures enum value "private_key_jwt"
	AccessRequestDataWithErrorTokenEndpointAuthnMethodPrivateKeyJwt string = "private_key_jwt"

	// AccessRequestDataWithErrorTokenEndpointAuthnMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	AccessRequestDataWithErrorTokenEndpointAuthnMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// AccessRequestDataWithErrorTokenEndpointAuthnMethodTLSClientAuth captures enum value "tls_client_auth"
	AccessRequestDataWithErrorTokenEndpointAuthnMethodTLSClientAuth string = "tls_client_auth"

	// AccessRequestDataWithErrorTokenEndpointAuthnMethodNone captures enum value "none"
	AccessRequestDataWithErrorTokenEndpointAuthnMethodNone string = "none"
)
View Source
const (

	// APIAPITypeRest captures enum value "rest"
	APIAPITypeRest string = "rest"

	// APIAPITypeGraphql captures enum value "graphql"
	APIAPITypeGraphql string = "graphql"
)
View Source
const (

	// AuditEventActionAuthenticated captures enum value "authenticated"
	AuditEventActionAuthenticated string = "authenticated"

	// AuditEventActionAuthorized captures enum value "authorized"
	AuditEventActionAuthorized string = "authorized"

	// AuditEventActionUnauthorized captures enum value "unauthorized"
	AuditEventActionUnauthorized string = "unauthorized"

	// AuditEventActionCreated captures enum value "created"
	AuditEventActionCreated string = "created"

	// AuditEventActionUpdated captures enum value "updated"
	AuditEventActionUpdated string = "updated"

	// AuditEventActionDeleted captures enum value "deleted"
	AuditEventActionDeleted string = "deleted"

	// AuditEventActionGenerated captures enum value "generated"
	AuditEventActionGenerated string = "generated"

	// AuditEventActionRequested captures enum value "requested"
	AuditEventActionRequested string = "requested"

	// AuditEventActionConfirmed captures enum value "confirmed"
	AuditEventActionConfirmed string = "confirmed"

	// AuditEventActionAccepted captures enum value "accepted"
	AuditEventActionAccepted string = "accepted"

	// AuditEventActionRejected captures enum value "rejected"
	AuditEventActionRejected string = "rejected"

	// AuditEventActionRevoked captures enum value "revoked"
	AuditEventActionRevoked string = "revoked"

	// AuditEventActionNotified captures enum value "notified"
	AuditEventActionNotified string = "notified"

	// AuditEventActionIssued captures enum value "issued"
	AuditEventActionIssued string = "issued"

	// AuditEventActionDenied captures enum value "denied"
	AuditEventActionDenied string = "denied"

	// AuditEventActionGranted captures enum value "granted"
	AuditEventActionGranted string = "granted"

	// AuditEventActionAttempted captures enum value "attempted"
	AuditEventActionAttempted string = "attempted"

	// AuditEventActionFailed captures enum value "failed"
	AuditEventActionFailed string = "failed"

	// AuditEventActionSucceeded captures enum value "succeeded"
	AuditEventActionSucceeded string = "succeeded"

	// AuditEventActionSent captures enum value "sent"
	AuditEventActionSent string = "sent"

	// AuditEventActionNotSent captures enum value "not_sent"
	AuditEventActionNotSent string = "not_sent"

	// AuditEventActionExecuted captures enum value "executed"
	AuditEventActionExecuted string = "executed"
)
View Source
const (

	// AuditEventEventSubjectRequest captures enum value "request"
	AuditEventEventSubjectRequest string = "request"

	// AuditEventEventSubjectGatewayRequest captures enum value "gateway_request"
	AuditEventEventSubjectGatewayRequest string = "gateway_request"

	// AuditEventEventSubjectGatewayPolicy captures enum value "gateway_policy"
	AuditEventEventSubjectGatewayPolicy string = "gateway_policy"

	// AuditEventEventSubjectPolicy captures enum value "policy"
	AuditEventEventSubjectPolicy string = "policy"

	// AuditEventEventSubjectClient captures enum value "client"
	AuditEventEventSubjectClient string = "client"

	// AuditEventEventSubjectCredential captures enum value "credential"
	AuditEventEventSubjectCredential string = "credential"

	// AuditEventEventSubjectLogin captures enum value "login"
	AuditEventEventSubjectLogin string = "login"

	// AuditEventEventSubjectPostAuthn captures enum value "post_authn"
	AuditEventEventSubjectPostAuthn string = "post_authn"

	// AuditEventEventSubjectConsent captures enum value "consent"
	AuditEventEventSubjectConsent string = "consent"

	// AuditEventEventSubjectClientConsents captures enum value "client_consents"
	AuditEventEventSubjectClientConsents string = "client_consents"

	// AuditEventEventSubjectCustomerConsents captures enum value "customer_consents"
	AuditEventEventSubjectCustomerConsents string = "customer_consents"

	// AuditEventEventSubjectAuthorizationCode captures enum value "authorization_code"
	AuditEventEventSubjectAuthorizationCode string = "authorization_code"

	// AuditEventEventSubjectAccessToken captures enum value "access_token"
	AuditEventEventSubjectAccessToken string = "access_token"

	// AuditEventEventSubjectSamlAssertion captures enum value "saml_assertion"
	AuditEventEventSubjectSamlAssertion string = "saml_assertion"

	// AuditEventEventSubjectScopes captures enum value "scopes"
	AuditEventEventSubjectScopes string = "scopes"

	// AuditEventEventSubjectOtp captures enum value "otp"
	AuditEventEventSubjectOtp string = "otp"

	// AuditEventEventSubjectUser captures enum value "user"
	AuditEventEventSubjectUser string = "user"

	// AuditEventEventSubjectSelfuser captures enum value "selfuser"
	AuditEventEventSubjectSelfuser string = "selfuser"

	// AuditEventEventSubjectSchema captures enum value "schema"
	AuditEventEventSubjectSchema string = "schema"

	// AuditEventEventSubjectPool captures enum value "pool"
	AuditEventEventSubjectPool string = "pool"

	// AuditEventEventSubjectPassword captures enum value "password"
	AuditEventEventSubjectPassword string = "password"

	// AuditEventEventSubjectBruteforce captures enum value "bruteforce"
	AuditEventEventSubjectBruteforce string = "bruteforce"

	// AuditEventEventSubjectDcr captures enum value "dcr"
	AuditEventEventSubjectDcr string = "dcr"

	// AuditEventEventSubjectScript captures enum value "script"
	AuditEventEventSubjectScript string = "script"

	// AuditEventEventSubjectRole captures enum value "role"
	AuditEventEventSubjectRole string = "role"

	// AuditEventEventSubjectTask captures enum value "task"
	AuditEventEventSubjectTask string = "task"

	// AuditEventEventSubjectJit captures enum value "jit"
	AuditEventEventSubjectJit string = "jit"

	// AuditEventEventSubjectTokens captures enum value "tokens"
	AuditEventEventSubjectTokens string = "tokens"

	// AuditEventEventSubjectService captures enum value "service"
	AuditEventEventSubjectService string = "service"

	// AuditEventEventSubjectServer captures enum value "server"
	AuditEventEventSubjectServer string = "server"
)
View Source
const (

	// CDRArrangementSharingTypeOneTime captures enum value "one_time"
	CDRArrangementSharingTypeOneTime string = "one_time"

	// CDRArrangementSharingTypeOneTimeWithRefreshToken captures enum value "one_time_with_refresh_token"
	CDRArrangementSharingTypeOneTimeWithRefreshToken string = "one_time_with_refresh_token"

	// CDRArrangementSharingTypeReusable captures enum value "reusable"
	CDRArrangementSharingTypeReusable string = "reusable"
)
View Source
const (

	// ClientAuthorizationEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP"
	ClientAuthorizationEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP"

	// ClientAuthorizationEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	ClientAuthorizationEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// ClientAuthorizationEncryptedResponseEncA256GCM captures enum value "A256GCM"
	ClientAuthorizationEncryptedResponseEncA256GCM string = "A256GCM"

	// ClientAuthorizationEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	ClientAuthorizationEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// ClientClientStatusActive captures enum value "active"
	ClientClientStatusActive string = "active"

	// ClientClientStatusInactive captures enum value "inactive"
	ClientClientStatusInactive string = "inactive"
)
View Source
const (

	// ClientClientTypeOauth2 captures enum value "oauth2"
	ClientClientTypeOauth2 string = "oauth2"

	// ClientClientTypeSaml captures enum value "saml"
	ClientClientTypeSaml string = "saml"
)
View Source
const (

	// ClientIDTokenEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP"
	ClientIDTokenEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP"

	// ClientIDTokenEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	ClientIDTokenEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// ClientIDTokenEncryptedResponseEncA256GCM captures enum value "A256GCM"
	ClientIDTokenEncryptedResponseEncA256GCM string = "A256GCM"

	// ClientIDTokenEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	ClientIDTokenEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// ClientIDTokenSignedResponseAlgRS256 captures enum value "RS256"
	ClientIDTokenSignedResponseAlgRS256 string = "RS256"

	// ClientIDTokenSignedResponseAlgES256 captures enum value "ES256"
	ClientIDTokenSignedResponseAlgES256 string = "ES256"

	// ClientIDTokenSignedResponseAlgPS256 captures enum value "PS256"
	ClientIDTokenSignedResponseAlgPS256 string = "PS256"
)
View Source
const (

	// ClientIntrospectionEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	ClientIntrospectionEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// ClientIntrospectionEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	ClientIntrospectionEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// ClientIntrospectionEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	ClientIntrospectionEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// ClientIntrospectionEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	ClientIntrospectionEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// ClientIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	ClientIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// ClientIntrospectionEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	ClientIntrospectionEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// ClientIntrospectionEndpointAuthMethodNone captures enum value "none"
	ClientIntrospectionEndpointAuthMethodNone string = "none"
)
View Source
const (

	// ClientRequestObjectEncryptionAlgRSADashOAEP captures enum value "RSA-OAEP"
	ClientRequestObjectEncryptionAlgRSADashOAEP string = "RSA-OAEP"

	// ClientRequestObjectEncryptionAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	ClientRequestObjectEncryptionAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// ClientRequestObjectEncryptionEncA256GCM captures enum value "A256GCM"
	ClientRequestObjectEncryptionEncA256GCM string = "A256GCM"

	// ClientRequestObjectEncryptionEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	ClientRequestObjectEncryptionEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// ClientRequestObjectSigningAlgAny captures enum value "any"
	ClientRequestObjectSigningAlgAny string = "any"

	// ClientRequestObjectSigningAlgNone captures enum value "none"
	ClientRequestObjectSigningAlgNone string = "none"

	// ClientRequestObjectSigningAlgRS256 captures enum value "RS256"
	ClientRequestObjectSigningAlgRS256 string = "RS256"

	// ClientRequestObjectSigningAlgES256 captures enum value "ES256"
	ClientRequestObjectSigningAlgES256 string = "ES256"

	// ClientRequestObjectSigningAlgPS256 captures enum value "PS256"
	ClientRequestObjectSigningAlgPS256 string = "PS256"
)
View Source
const (

	// ClientRevocationEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	ClientRevocationEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// ClientRevocationEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	ClientRevocationEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// ClientRevocationEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	ClientRevocationEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// ClientRevocationEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	ClientRevocationEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// ClientRevocationEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	ClientRevocationEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// ClientRevocationEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	ClientRevocationEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// ClientRevocationEndpointAuthMethodNone captures enum value "none"
	ClientRevocationEndpointAuthMethodNone string = "none"
)
View Source
const (

	// ClientSubjectTypePublic captures enum value "public"
	ClientSubjectTypePublic string = "public"

	// ClientSubjectTypePairwise captures enum value "pairwise"
	ClientSubjectTypePairwise string = "pairwise"
)
View Source
const (

	// ClientTokenEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	ClientTokenEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// ClientTokenEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	ClientTokenEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// ClientTokenEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	ClientTokenEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// ClientTokenEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	ClientTokenEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// ClientTokenEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	ClientTokenEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// ClientTokenEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	ClientTokenEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// ClientTokenEndpointAuthMethodNone captures enum value "none"
	ClientTokenEndpointAuthMethodNone string = "none"
)
View Source
const (

	// ClientTokenEndpointAuthSigningAlgRS256 captures enum value "RS256"
	ClientTokenEndpointAuthSigningAlgRS256 string = "RS256"

	// ClientTokenEndpointAuthSigningAlgES256 captures enum value "ES256"
	ClientTokenEndpointAuthSigningAlgES256 string = "ES256"

	// ClientTokenEndpointAuthSigningAlgPS256 captures enum value "PS256"
	ClientTokenEndpointAuthSigningAlgPS256 string = "PS256"

	// ClientTokenEndpointAuthSigningAlgHS256 captures enum value "HS256"
	ClientTokenEndpointAuthSigningAlgHS256 string = "HS256"

	// ClientTokenEndpointAuthSigningAlgEmpty captures enum value ""
	ClientTokenEndpointAuthSigningAlgEmpty string = ""
)
View Source
const (

	// ClientUserinfoSignedResponseAlgNone captures enum value "none"
	ClientUserinfoSignedResponseAlgNone string = "none"

	// ClientUserinfoSignedResponseAlgRS256 captures enum value "RS256"
	ClientUserinfoSignedResponseAlgRS256 string = "RS256"

	// ClientUserinfoSignedResponseAlgES256 captures enum value "ES256"
	ClientUserinfoSignedResponseAlgES256 string = "ES256"
)
View Source
const (

	// ClientAdminResponseAuthorizationEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP"
	ClientAdminResponseAuthorizationEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP"

	// ClientAdminResponseAuthorizationEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	ClientAdminResponseAuthorizationEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// ClientAdminResponseAuthorizationEncryptedResponseEncA256GCM captures enum value "A256GCM"
	ClientAdminResponseAuthorizationEncryptedResponseEncA256GCM string = "A256GCM"

	// ClientAdminResponseAuthorizationEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	ClientAdminResponseAuthorizationEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// ClientAdminResponseClientStatusActive captures enum value "active"
	ClientAdminResponseClientStatusActive string = "active"

	// ClientAdminResponseClientStatusInactive captures enum value "inactive"
	ClientAdminResponseClientStatusInactive string = "inactive"
)
View Source
const (

	// ClientAdminResponseClientTypeOauth2 captures enum value "oauth2"
	ClientAdminResponseClientTypeOauth2 string = "oauth2"

	// ClientAdminResponseClientTypeSaml captures enum value "saml"
	ClientAdminResponseClientTypeSaml string = "saml"
)
View Source
const (

	// ClientAdminResponseIDTokenEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP"
	ClientAdminResponseIDTokenEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP"

	// ClientAdminResponseIDTokenEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	ClientAdminResponseIDTokenEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// ClientAdminResponseIDTokenEncryptedResponseEncA256GCM captures enum value "A256GCM"
	ClientAdminResponseIDTokenEncryptedResponseEncA256GCM string = "A256GCM"

	// ClientAdminResponseIDTokenEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	ClientAdminResponseIDTokenEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// ClientAdminResponseIDTokenSignedResponseAlgRS256 captures enum value "RS256"
	ClientAdminResponseIDTokenSignedResponseAlgRS256 string = "RS256"

	// ClientAdminResponseIDTokenSignedResponseAlgES256 captures enum value "ES256"
	ClientAdminResponseIDTokenSignedResponseAlgES256 string = "ES256"

	// ClientAdminResponseIDTokenSignedResponseAlgPS256 captures enum value "PS256"
	ClientAdminResponseIDTokenSignedResponseAlgPS256 string = "PS256"
)
View Source
const (

	// ClientAdminResponseIntrospectionEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	ClientAdminResponseIntrospectionEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// ClientAdminResponseIntrospectionEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	ClientAdminResponseIntrospectionEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// ClientAdminResponseIntrospectionEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	ClientAdminResponseIntrospectionEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// ClientAdminResponseIntrospectionEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	ClientAdminResponseIntrospectionEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// ClientAdminResponseIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	ClientAdminResponseIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// ClientAdminResponseIntrospectionEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	ClientAdminResponseIntrospectionEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// ClientAdminResponseIntrospectionEndpointAuthMethodNone captures enum value "none"
	ClientAdminResponseIntrospectionEndpointAuthMethodNone string = "none"
)
View Source
const (

	// ClientAdminResponseRequestObjectEncryptionAlgRSADashOAEP captures enum value "RSA-OAEP"
	ClientAdminResponseRequestObjectEncryptionAlgRSADashOAEP string = "RSA-OAEP"

	// ClientAdminResponseRequestObjectEncryptionAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	ClientAdminResponseRequestObjectEncryptionAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// ClientAdminResponseRequestObjectEncryptionEncA256GCM captures enum value "A256GCM"
	ClientAdminResponseRequestObjectEncryptionEncA256GCM string = "A256GCM"

	// ClientAdminResponseRequestObjectEncryptionEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	ClientAdminResponseRequestObjectEncryptionEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// ClientAdminResponseRequestObjectSigningAlgAny captures enum value "any"
	ClientAdminResponseRequestObjectSigningAlgAny string = "any"

	// ClientAdminResponseRequestObjectSigningAlgNone captures enum value "none"
	ClientAdminResponseRequestObjectSigningAlgNone string = "none"

	// ClientAdminResponseRequestObjectSigningAlgRS256 captures enum value "RS256"
	ClientAdminResponseRequestObjectSigningAlgRS256 string = "RS256"

	// ClientAdminResponseRequestObjectSigningAlgES256 captures enum value "ES256"
	ClientAdminResponseRequestObjectSigningAlgES256 string = "ES256"

	// ClientAdminResponseRequestObjectSigningAlgPS256 captures enum value "PS256"
	ClientAdminResponseRequestObjectSigningAlgPS256 string = "PS256"
)
View Source
const (

	// ClientAdminResponseRevocationEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	ClientAdminResponseRevocationEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// ClientAdminResponseRevocationEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	ClientAdminResponseRevocationEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// ClientAdminResponseRevocationEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	ClientAdminResponseRevocationEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// ClientAdminResponseRevocationEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	ClientAdminResponseRevocationEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// ClientAdminResponseRevocationEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	ClientAdminResponseRevocationEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// ClientAdminResponseRevocationEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	ClientAdminResponseRevocationEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// ClientAdminResponseRevocationEndpointAuthMethodNone captures enum value "none"
	ClientAdminResponseRevocationEndpointAuthMethodNone string = "none"
)
View Source
const (

	// ClientAdminResponseSubjectTypePublic captures enum value "public"
	ClientAdminResponseSubjectTypePublic string = "public"

	// ClientAdminResponseSubjectTypePairwise captures enum value "pairwise"
	ClientAdminResponseSubjectTypePairwise string = "pairwise"
)
View Source
const (

	// ClientAdminResponseTokenEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	ClientAdminResponseTokenEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// ClientAdminResponseTokenEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	ClientAdminResponseTokenEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// ClientAdminResponseTokenEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	ClientAdminResponseTokenEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// ClientAdminResponseTokenEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	ClientAdminResponseTokenEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// ClientAdminResponseTokenEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	ClientAdminResponseTokenEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// ClientAdminResponseTokenEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	ClientAdminResponseTokenEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// ClientAdminResponseTokenEndpointAuthMethodNone captures enum value "none"
	ClientAdminResponseTokenEndpointAuthMethodNone string = "none"
)
View Source
const (

	// ClientAdminResponseTokenEndpointAuthSigningAlgRS256 captures enum value "RS256"
	ClientAdminResponseTokenEndpointAuthSigningAlgRS256 string = "RS256"

	// ClientAdminResponseTokenEndpointAuthSigningAlgES256 captures enum value "ES256"
	ClientAdminResponseTokenEndpointAuthSigningAlgES256 string = "ES256"

	// ClientAdminResponseTokenEndpointAuthSigningAlgPS256 captures enum value "PS256"
	ClientAdminResponseTokenEndpointAuthSigningAlgPS256 string = "PS256"

	// ClientAdminResponseTokenEndpointAuthSigningAlgHS256 captures enum value "HS256"
	ClientAdminResponseTokenEndpointAuthSigningAlgHS256 string = "HS256"

	// ClientAdminResponseTokenEndpointAuthSigningAlgEmpty captures enum value ""
	ClientAdminResponseTokenEndpointAuthSigningAlgEmpty string = ""
)
View Source
const (

	// ClientAdminResponseUserinfoSignedResponseAlgNone captures enum value "none"
	ClientAdminResponseUserinfoSignedResponseAlgNone string = "none"

	// ClientAdminResponseUserinfoSignedResponseAlgRS256 captures enum value "RS256"
	ClientAdminResponseUserinfoSignedResponseAlgRS256 string = "RS256"

	// ClientAdminResponseUserinfoSignedResponseAlgES256 captures enum value "ES256"
	ClientAdminResponseUserinfoSignedResponseAlgES256 string = "ES256"
)
View Source
const (

	// ClientAuditPayloadAuthorizationEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP"
	ClientAuditPayloadAuthorizationEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP"

	// ClientAuditPayloadAuthorizationEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	ClientAuditPayloadAuthorizationEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// ClientAuditPayloadAuthorizationEncryptedResponseEncA256GCM captures enum value "A256GCM"
	ClientAuditPayloadAuthorizationEncryptedResponseEncA256GCM string = "A256GCM"

	// ClientAuditPayloadAuthorizationEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	ClientAuditPayloadAuthorizationEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// ClientAuditPayloadClientStatusActive captures enum value "active"
	ClientAuditPayloadClientStatusActive string = "active"

	// ClientAuditPayloadClientStatusInactive captures enum value "inactive"
	ClientAuditPayloadClientStatusInactive string = "inactive"
)
View Source
const (

	// ClientAuditPayloadIDTokenEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP"
	ClientAuditPayloadIDTokenEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP"

	// ClientAuditPayloadIDTokenEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	ClientAuditPayloadIDTokenEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// ClientAuditPayloadIDTokenEncryptedResponseEncA256GCM captures enum value "A256GCM"
	ClientAuditPayloadIDTokenEncryptedResponseEncA256GCM string = "A256GCM"

	// ClientAuditPayloadIDTokenEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	ClientAuditPayloadIDTokenEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// ClientAuditPayloadIDTokenSignedResponseAlgRS256 captures enum value "RS256"
	ClientAuditPayloadIDTokenSignedResponseAlgRS256 string = "RS256"

	// ClientAuditPayloadIDTokenSignedResponseAlgES256 captures enum value "ES256"
	ClientAuditPayloadIDTokenSignedResponseAlgES256 string = "ES256"

	// ClientAuditPayloadIDTokenSignedResponseAlgPS256 captures enum value "PS256"
	ClientAuditPayloadIDTokenSignedResponseAlgPS256 string = "PS256"
)
View Source
const (

	// ClientAuditPayloadIntrospectionEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	ClientAuditPayloadIntrospectionEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// ClientAuditPayloadIntrospectionEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	ClientAuditPayloadIntrospectionEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// ClientAuditPayloadIntrospectionEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	ClientAuditPayloadIntrospectionEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// ClientAuditPayloadIntrospectionEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	ClientAuditPayloadIntrospectionEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// ClientAuditPayloadIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	ClientAuditPayloadIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// ClientAuditPayloadIntrospectionEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	ClientAuditPayloadIntrospectionEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// ClientAuditPayloadIntrospectionEndpointAuthMethodNone captures enum value "none"
	ClientAuditPayloadIntrospectionEndpointAuthMethodNone string = "none"
)
View Source
const (

	// ClientAuditPayloadRequestObjectEncryptionAlgRSADashOAEP captures enum value "RSA-OAEP"
	ClientAuditPayloadRequestObjectEncryptionAlgRSADashOAEP string = "RSA-OAEP"

	// ClientAuditPayloadRequestObjectEncryptionAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	ClientAuditPayloadRequestObjectEncryptionAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// ClientAuditPayloadRequestObjectEncryptionEncA256GCM captures enum value "A256GCM"
	ClientAuditPayloadRequestObjectEncryptionEncA256GCM string = "A256GCM"

	// ClientAuditPayloadRequestObjectEncryptionEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	ClientAuditPayloadRequestObjectEncryptionEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// ClientAuditPayloadRequestObjectSigningAlgAny captures enum value "any"
	ClientAuditPayloadRequestObjectSigningAlgAny string = "any"

	// ClientAuditPayloadRequestObjectSigningAlgNone captures enum value "none"
	ClientAuditPayloadRequestObjectSigningAlgNone string = "none"

	// ClientAuditPayloadRequestObjectSigningAlgRS256 captures enum value "RS256"
	ClientAuditPayloadRequestObjectSigningAlgRS256 string = "RS256"

	// ClientAuditPayloadRequestObjectSigningAlgES256 captures enum value "ES256"
	ClientAuditPayloadRequestObjectSigningAlgES256 string = "ES256"

	// ClientAuditPayloadRequestObjectSigningAlgPS256 captures enum value "PS256"
	ClientAuditPayloadRequestObjectSigningAlgPS256 string = "PS256"
)
View Source
const (

	// ClientAuditPayloadRevocationEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	ClientAuditPayloadRevocationEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// ClientAuditPayloadRevocationEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	ClientAuditPayloadRevocationEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// ClientAuditPayloadRevocationEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	ClientAuditPayloadRevocationEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// ClientAuditPayloadRevocationEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	ClientAuditPayloadRevocationEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// ClientAuditPayloadRevocationEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	ClientAuditPayloadRevocationEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// ClientAuditPayloadRevocationEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	ClientAuditPayloadRevocationEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// ClientAuditPayloadRevocationEndpointAuthMethodNone captures enum value "none"
	ClientAuditPayloadRevocationEndpointAuthMethodNone string = "none"
)
View Source
const (

	// ClientAuditPayloadSubjectTypePublic captures enum value "public"
	ClientAuditPayloadSubjectTypePublic string = "public"

	// ClientAuditPayloadSubjectTypePairwise captures enum value "pairwise"
	ClientAuditPayloadSubjectTypePairwise string = "pairwise"
)
View Source
const (

	// ClientAuditPayloadTokenEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	ClientAuditPayloadTokenEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// ClientAuditPayloadTokenEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	ClientAuditPayloadTokenEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// ClientAuditPayloadTokenEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	ClientAuditPayloadTokenEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// ClientAuditPayloadTokenEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	ClientAuditPayloadTokenEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// ClientAuditPayloadTokenEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	ClientAuditPayloadTokenEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// ClientAuditPayloadTokenEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	ClientAuditPayloadTokenEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// ClientAuditPayloadTokenEndpointAuthMethodNone captures enum value "none"
	ClientAuditPayloadTokenEndpointAuthMethodNone string = "none"
)
View Source
const (

	// ClientAuditPayloadTokenEndpointAuthSigningAlgRS256 captures enum value "RS256"
	ClientAuditPayloadTokenEndpointAuthSigningAlgRS256 string = "RS256"

	// ClientAuditPayloadTokenEndpointAuthSigningAlgES256 captures enum value "ES256"
	ClientAuditPayloadTokenEndpointAuthSigningAlgES256 string = "ES256"

	// ClientAuditPayloadTokenEndpointAuthSigningAlgPS256 captures enum value "PS256"
	ClientAuditPayloadTokenEndpointAuthSigningAlgPS256 string = "PS256"

	// ClientAuditPayloadTokenEndpointAuthSigningAlgHS256 captures enum value "HS256"
	ClientAuditPayloadTokenEndpointAuthSigningAlgHS256 string = "HS256"

	// ClientAuditPayloadTokenEndpointAuthSigningAlgEmpty captures enum value ""
	ClientAuditPayloadTokenEndpointAuthSigningAlgEmpty string = ""
)
View Source
const (

	// ClientAuditPayloadUserinfoSignedResponseAlgNone captures enum value "none"
	ClientAuditPayloadUserinfoSignedResponseAlgNone string = "none"

	// ClientAuditPayloadUserinfoSignedResponseAlgRS256 captures enum value "RS256"
	ClientAuditPayloadUserinfoSignedResponseAlgRS256 string = "RS256"

	// ClientAuditPayloadUserinfoSignedResponseAlgES256 captures enum value "ES256"
	ClientAuditPayloadUserinfoSignedResponseAlgES256 string = "ES256"
)
View Source
const (

	// CreateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP"
	CreateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP"

	// CreateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	CreateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// CreateClientAdminRequestAuthorizationEncryptedResponseEncA256GCM captures enum value "A256GCM"
	CreateClientAdminRequestAuthorizationEncryptedResponseEncA256GCM string = "A256GCM"

	// CreateClientAdminRequestAuthorizationEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	CreateClientAdminRequestAuthorizationEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// CreateClientAdminRequestClientStatusActive captures enum value "active"
	CreateClientAdminRequestClientStatusActive string = "active"

	// CreateClientAdminRequestClientStatusInactive captures enum value "inactive"
	CreateClientAdminRequestClientStatusInactive string = "inactive"
)
View Source
const (

	// CreateClientAdminRequestClientTypeOauth2 captures enum value "oauth2"
	CreateClientAdminRequestClientTypeOauth2 string = "oauth2"

	// CreateClientAdminRequestClientTypeSaml captures enum value "saml"
	CreateClientAdminRequestClientTypeSaml string = "saml"
)
View Source
const (

	// CreateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP"
	CreateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP"

	// CreateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	CreateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// CreateClientAdminRequestIDTokenEncryptedResponseEncA256GCM captures enum value "A256GCM"
	CreateClientAdminRequestIDTokenEncryptedResponseEncA256GCM string = "A256GCM"

	// CreateClientAdminRequestIDTokenEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	CreateClientAdminRequestIDTokenEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// CreateClientAdminRequestIDTokenSignedResponseAlgRS256 captures enum value "RS256"
	CreateClientAdminRequestIDTokenSignedResponseAlgRS256 string = "RS256"

	// CreateClientAdminRequestIDTokenSignedResponseAlgES256 captures enum value "ES256"
	CreateClientAdminRequestIDTokenSignedResponseAlgES256 string = "ES256"

	// CreateClientAdminRequestIDTokenSignedResponseAlgPS256 captures enum value "PS256"
	CreateClientAdminRequestIDTokenSignedResponseAlgPS256 string = "PS256"
)
View Source
const (

	// CreateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	CreateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// CreateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	CreateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// CreateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	CreateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// CreateClientAdminRequestIntrospectionEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	CreateClientAdminRequestIntrospectionEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// CreateClientAdminRequestIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	CreateClientAdminRequestIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// CreateClientAdminRequestIntrospectionEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	CreateClientAdminRequestIntrospectionEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// CreateClientAdminRequestIntrospectionEndpointAuthMethodNone captures enum value "none"
	CreateClientAdminRequestIntrospectionEndpointAuthMethodNone string = "none"
)
View Source
const (

	// CreateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEP captures enum value "RSA-OAEP"
	CreateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEP string = "RSA-OAEP"

	// CreateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	CreateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// CreateClientAdminRequestRequestObjectEncryptionEncA256GCM captures enum value "A256GCM"
	CreateClientAdminRequestRequestObjectEncryptionEncA256GCM string = "A256GCM"

	// CreateClientAdminRequestRequestObjectEncryptionEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	CreateClientAdminRequestRequestObjectEncryptionEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// CreateClientAdminRequestRequestObjectSigningAlgAny captures enum value "any"
	CreateClientAdminRequestRequestObjectSigningAlgAny string = "any"

	// CreateClientAdminRequestRequestObjectSigningAlgNone captures enum value "none"
	CreateClientAdminRequestRequestObjectSigningAlgNone string = "none"

	// CreateClientAdminRequestRequestObjectSigningAlgRS256 captures enum value "RS256"
	CreateClientAdminRequestRequestObjectSigningAlgRS256 string = "RS256"

	// CreateClientAdminRequestRequestObjectSigningAlgES256 captures enum value "ES256"
	CreateClientAdminRequestRequestObjectSigningAlgES256 string = "ES256"

	// CreateClientAdminRequestRequestObjectSigningAlgPS256 captures enum value "PS256"
	CreateClientAdminRequestRequestObjectSigningAlgPS256 string = "PS256"
)
View Source
const (

	// CreateClientAdminRequestRevocationEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	CreateClientAdminRequestRevocationEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// CreateClientAdminRequestRevocationEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	CreateClientAdminRequestRevocationEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// CreateClientAdminRequestRevocationEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	CreateClientAdminRequestRevocationEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// CreateClientAdminRequestRevocationEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	CreateClientAdminRequestRevocationEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// CreateClientAdminRequestRevocationEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	CreateClientAdminRequestRevocationEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// CreateClientAdminRequestRevocationEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	CreateClientAdminRequestRevocationEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// CreateClientAdminRequestRevocationEndpointAuthMethodNone captures enum value "none"
	CreateClientAdminRequestRevocationEndpointAuthMethodNone string = "none"
)
View Source
const (

	// CreateClientAdminRequestSubjectTypePublic captures enum value "public"
	CreateClientAdminRequestSubjectTypePublic string = "public"

	// CreateClientAdminRequestSubjectTypePairwise captures enum value "pairwise"
	CreateClientAdminRequestSubjectTypePairwise string = "pairwise"
)
View Source
const (

	// CreateClientAdminRequestTokenEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	CreateClientAdminRequestTokenEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// CreateClientAdminRequestTokenEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	CreateClientAdminRequestTokenEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// CreateClientAdminRequestTokenEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	CreateClientAdminRequestTokenEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// CreateClientAdminRequestTokenEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	CreateClientAdminRequestTokenEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// CreateClientAdminRequestTokenEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	CreateClientAdminRequestTokenEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// CreateClientAdminRequestTokenEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	CreateClientAdminRequestTokenEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// CreateClientAdminRequestTokenEndpointAuthMethodNone captures enum value "none"
	CreateClientAdminRequestTokenEndpointAuthMethodNone string = "none"
)
View Source
const (

	// CreateClientAdminRequestTokenEndpointAuthSigningAlgRS256 captures enum value "RS256"
	CreateClientAdminRequestTokenEndpointAuthSigningAlgRS256 string = "RS256"

	// CreateClientAdminRequestTokenEndpointAuthSigningAlgES256 captures enum value "ES256"
	CreateClientAdminRequestTokenEndpointAuthSigningAlgES256 string = "ES256"

	// CreateClientAdminRequestTokenEndpointAuthSigningAlgPS256 captures enum value "PS256"
	CreateClientAdminRequestTokenEndpointAuthSigningAlgPS256 string = "PS256"

	// CreateClientAdminRequestTokenEndpointAuthSigningAlgHS256 captures enum value "HS256"
	CreateClientAdminRequestTokenEndpointAuthSigningAlgHS256 string = "HS256"

	// CreateClientAdminRequestTokenEndpointAuthSigningAlgEmpty captures enum value ""
	CreateClientAdminRequestTokenEndpointAuthSigningAlgEmpty string = ""
)
View Source
const (

	// CreateClientAdminRequestUserinfoSignedResponseAlgNone captures enum value "none"
	CreateClientAdminRequestUserinfoSignedResponseAlgNone string = "none"

	// CreateClientAdminRequestUserinfoSignedResponseAlgRS256 captures enum value "RS256"
	CreateClientAdminRequestUserinfoSignedResponseAlgRS256 string = "RS256"

	// CreateClientAdminRequestUserinfoSignedResponseAlgES256 captures enum value "ES256"
	CreateClientAdminRequestUserinfoSignedResponseAlgES256 string = "ES256"
)
View Source
const (

	// DCRDetailsTokenEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	DCRDetailsTokenEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// DCRDetailsTokenEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	DCRDetailsTokenEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// DCRDetailsTokenEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	DCRDetailsTokenEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// DCRDetailsTokenEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	DCRDetailsTokenEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// DCRDetailsTokenEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	DCRDetailsTokenEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// DCRDetailsTokenEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	DCRDetailsTokenEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// DCRDetailsTokenEndpointAuthMethodNone captures enum value "none"
	DCRDetailsTokenEndpointAuthMethodNone string = "none"
)
View Source
const (

	// EmailSettingsProviderSMTP captures enum value "smtp"
	EmailSettingsProviderSMTP string = "smtp"

	// EmailSettingsProviderEmbedded captures enum value "embedded"
	EmailSettingsProviderEmbedded string = "embedded"
)
View Source
const (

	// FDXConsentRevocationInitiatorDATAACCESSPLATFORM captures enum value "DATA_ACCESS_PLATFORM"
	FDXConsentRevocationInitiatorDATAACCESSPLATFORM string = "DATA_ACCESS_PLATFORM"

	// FDXConsentRevocationInitiatorDATAPROVIDER captures enum value "DATA_PROVIDER"
	FDXConsentRevocationInitiatorDATAPROVIDER string = "DATA_PROVIDER"

	// FDXConsentRevocationInitiatorDATARECIPIENT captures enum value "DATA_RECIPIENT"
	FDXConsentRevocationInitiatorDATARECIPIENT string = "DATA_RECIPIENT"

	// FDXConsentRevocationInitiatorINDIVIDUAL captures enum value "INDIVIDUAL"
	FDXConsentRevocationInitiatorINDIVIDUAL string = "INDIVIDUAL"

	// FDXConsentRevocationInitiatorMERCHANT captures enum value "MERCHANT"
	FDXConsentRevocationInitiatorMERCHANT string = "MERCHANT"

	// FDXConsentRevocationInitiatorVENDOR captures enum value "VENDOR"
	FDXConsentRevocationInitiatorVENDOR string = "VENDOR"
)
View Source
const (

	// FDXConsentRevocationReasonBUSINESSRULE captures enum value "BUSINESS_RULE"
	FDXConsentRevocationReasonBUSINESSRULE string = "BUSINESS_RULE"

	// FDXConsentRevocationReasonUSERACTION captures enum value "USER_ACTION"
	FDXConsentRevocationReasonUSERACTION string = "USER_ACTION"
)
View Source
const (

	// GatewayAPIAPITypeRest captures enum value "rest"
	GatewayAPIAPITypeRest string = "rest"

	// GatewayAPIAPITypeGraphql captures enum value "graphql"
	GatewayAPIAPITypeGraphql string = "graphql"
)
View Source
const (

	// GrantIdentityPoolRoleRequestTypeIdentityPoolUser captures enum value "identity_pool_user"
	GrantIdentityPoolRoleRequestTypeIdentityPoolUser string = "identity_pool_user"

	// GrantIdentityPoolRoleRequestTypeIdp captures enum value "idp"
	GrantIdentityPoolRoleRequestTypeIdp string = "idp"
)
View Source
const (

	// GrantTenantRoleRequestRoleAdmin captures enum value "admin"
	GrantTenantRoleRequestRoleAdmin string = "admin"

	// GrantTenantRoleRequestRoleBusinessAdmin captures enum value "business_admin"
	GrantTenantRoleRequestRoleBusinessAdmin string = "business_admin"

	// GrantTenantRoleRequestRoleAuditor captures enum value "auditor"
	GrantTenantRoleRequestRoleAuditor string = "auditor"

	// GrantTenantRoleRequestRoleMember captures enum value "member"
	GrantTenantRoleRequestRoleMember string = "member"
)
View Source
const (

	// GrantTenantRoleRequestTypeIdentityPoolUser captures enum value "identity_pool_user"
	GrantTenantRoleRequestTypeIdentityPoolUser string = "identity_pool_user"

	// GrantTenantRoleRequestTypeIdp captures enum value "idp"
	GrantTenantRoleRequestTypeIdp string = "idp"
)
View Source
const (

	// GrantWorkspaceRoleRequestRoleAdmin captures enum value "admin"
	GrantWorkspaceRoleRequestRoleAdmin string = "admin"

	// GrantWorkspaceRoleRequestRoleAuditor captures enum value "auditor"
	GrantWorkspaceRoleRequestRoleAuditor string = "auditor"

	// GrantWorkspaceRoleRequestRoleManager captures enum value "manager"
	GrantWorkspaceRoleRequestRoleManager string = "manager"

	// GrantWorkspaceRoleRequestRoleUserManager captures enum value "user_manager"
	GrantWorkspaceRoleRequestRoleUserManager string = "user_manager"

	// GrantWorkspaceRoleRequestRoleMember captures enum value "member"
	GrantWorkspaceRoleRequestRoleMember string = "member"
)
View Source
const (

	// GrantWorkspaceRoleRequestTypeIdentityPoolUser captures enum value "identity_pool_user"
	GrantWorkspaceRoleRequestTypeIdentityPoolUser string = "identity_pool_user"

	// GrantWorkspaceRoleRequestTypeIdp captures enum value "idp"
	GrantWorkspaceRoleRequestTypeIdp string = "idp"
)
View Source
const (

	// IDPDiscoveryDiscoveryModeDomainMatching captures enum value "domain_matching"
	IDPDiscoveryDiscoveryModeDomainMatching string = "domain_matching"

	// IDPDiscoveryDiscoveryModeScriptExecution captures enum value "script_execution"
	IDPDiscoveryDiscoveryModeScriptExecution string = "script_execution"
)
View Source
const (

	// IdentityPoolRoleSubjectTypeIdentityPoolUser captures enum value "identity_pool_user"
	IdentityPoolRoleSubjectTypeIdentityPoolUser string = "identity_pool_user"

	// IdentityPoolRoleSubjectTypeIdp captures enum value "idp"
	IdentityPoolRoleSubjectTypeIdp string = "idp"
)
View Source
const (

	// ImportServiceConfigurationResultTypeOauth2 captures enum value "oauth2"
	ImportServiceConfigurationResultTypeOauth2 string = "oauth2"

	// ImportServiceConfigurationResultTypeOidc captures enum value "oidc"
	ImportServiceConfigurationResultTypeOidc string = "oidc"

	// ImportServiceConfigurationResultTypeSystem captures enum value "system"
	ImportServiceConfigurationResultTypeSystem string = "system"

	// ImportServiceConfigurationResultTypeUser captures enum value "user"
	ImportServiceConfigurationResultTypeUser string = "user"

	// ImportServiceConfigurationResultTypeOpenbanking captures enum value "openbanking"
	ImportServiceConfigurationResultTypeOpenbanking string = "openbanking"
)
View Source
const (

	// LicenseLicenseTypeTrial captures enum value "trial"
	LicenseLicenseTypeTrial string = "trial"

	// LicenseLicenseTypeEnterprise captures enum value "enterprise"
	LicenseLicenseTypeEnterprise string = "enterprise"
)
View Source
const (

	// MFAMethodMechanismSms captures enum value "sms"
	MFAMethodMechanismSms string = "sms"

	// MFAMethodMechanismEmail captures enum value "email"
	MFAMethodMechanismEmail string = "email"
)
View Source
const (

	// MFAMethodResponseMechanismSms captures enum value "sms"
	MFAMethodResponseMechanismSms string = "sms"

	// MFAMethodResponseMechanismEmail captures enum value "email"
	MFAMethodResponseMechanismEmail string = "email"
)
View Source
const (

	// OIDCSettingsAuthenticationMethodClientSecret captures enum value "client_secret"
	OIDCSettingsAuthenticationMethodClientSecret string = "client_secret"

	// OIDCSettingsAuthenticationMethodPrivateKeyJwt captures enum value "private_key_jwt"
	OIDCSettingsAuthenticationMethodPrivateKeyJwt string = "private_key_jwt"
)
View Source
const (

	// OTPPayloadTypeSms captures enum value "sms"
	OTPPayloadTypeSms string = "sms"

	// OTPPayloadTypeEmail captures enum value "email"
	OTPPayloadTypeEmail string = "email"
)
View Source
const (

	// OrganizationResponseSubjectFormatHash captures enum value "hash"
	OrganizationResponseSubjectFormatHash string = "hash"

	// OrganizationResponseSubjectFormatLegacy captures enum value "legacy"
	OrganizationResponseSubjectFormatLegacy string = "legacy"
)
View Source
const (

	// PayloadSettingsFormatJSON captures enum value "json"
	PayloadSettingsFormatJSON string = "json"

	// PayloadSettingsFormatJws captures enum value "jws"
	PayloadSettingsFormatJws string = "jws"
)
View Source
const (

	// RequestValidatedPayloadTokenEndpointAuthnMethodClientSecretBasic captures enum value "client_secret_basic"
	RequestValidatedPayloadTokenEndpointAuthnMethodClientSecretBasic string = "client_secret_basic"

	// RequestValidatedPayloadTokenEndpointAuthnMethodClientSecretPost captures enum value "client_secret_post"
	RequestValidatedPayloadTokenEndpointAuthnMethodClientSecretPost string = "client_secret_post"

	// RequestValidatedPayloadTokenEndpointAuthnMethodClientSecretJwt captures enum value "client_secret_jwt"
	RequestValidatedPayloadTokenEndpointAuthnMethodClientSecretJwt string = "client_secret_jwt"

	// RequestValidatedPayloadTokenEndpointAuthnMethodPrivateKeyJwt captures enum value "private_key_jwt"
	RequestValidatedPayloadTokenEndpointAuthnMethodPrivateKeyJwt string = "private_key_jwt"

	// RequestValidatedPayloadTokenEndpointAuthnMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	RequestValidatedPayloadTokenEndpointAuthnMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// RequestValidatedPayloadTokenEndpointAuthnMethodTLSClientAuth captures enum value "tls_client_auth"
	RequestValidatedPayloadTokenEndpointAuthnMethodTLSClientAuth string = "tls_client_auth"

	// RequestValidatedPayloadTokenEndpointAuthnMethodNone captures enum value "none"
	RequestValidatedPayloadTokenEndpointAuthnMethodNone string = "none"
)
View Source
const (

	// RevokeIdentityPoolRoleRequestTypeIdentityPoolUser captures enum value "identity_pool_user"
	RevokeIdentityPoolRoleRequestTypeIdentityPoolUser string = "identity_pool_user"

	// RevokeIdentityPoolRoleRequestTypeIdp captures enum value "idp"
	RevokeIdentityPoolRoleRequestTypeIdp string = "idp"
)
View Source
const (

	// RevokeTenantRoleRequestRoleAdmin captures enum value "admin"
	RevokeTenantRoleRequestRoleAdmin string = "admin"

	// RevokeTenantRoleRequestRoleBusinessAdmin captures enum value "business_admin"
	RevokeTenantRoleRequestRoleBusinessAdmin string = "business_admin"

	// RevokeTenantRoleRequestRoleAuditor captures enum value "auditor"
	RevokeTenantRoleRequestRoleAuditor string = "auditor"

	// RevokeTenantRoleRequestRoleMember captures enum value "member"
	RevokeTenantRoleRequestRoleMember string = "member"
)
View Source
const (

	// RevokeTenantRoleRequestTypeIdentityPoolUser captures enum value "identity_pool_user"
	RevokeTenantRoleRequestTypeIdentityPoolUser string = "identity_pool_user"

	// RevokeTenantRoleRequestTypeIdp captures enum value "idp"
	RevokeTenantRoleRequestTypeIdp string = "idp"
)
View Source
const (

	// RevokeWorkspaceRoleRequestRoleAdmin captures enum value "admin"
	RevokeWorkspaceRoleRequestRoleAdmin string = "admin"

	// RevokeWorkspaceRoleRequestRoleAuditor captures enum value "auditor"
	RevokeWorkspaceRoleRequestRoleAuditor string = "auditor"

	// RevokeWorkspaceRoleRequestRoleManager captures enum value "manager"
	RevokeWorkspaceRoleRequestRoleManager string = "manager"

	// RevokeWorkspaceRoleRequestRoleUserManager captures enum value "user_manager"
	RevokeWorkspaceRoleRequestRoleUserManager string = "user_manager"

	// RevokeWorkspaceRoleRequestRoleMember captures enum value "member"
	RevokeWorkspaceRoleRequestRoleMember string = "member"
)
View Source
const (

	// RevokeWorkspaceRoleRequestTypeIdentityPoolUser captures enum value "identity_pool_user"
	RevokeWorkspaceRoleRequestTypeIdentityPoolUser string = "identity_pool_user"

	// RevokeWorkspaceRoleRequestTypeIdp captures enum value "idp"
	RevokeWorkspaceRoleRequestTypeIdp string = "idp"
)
View Source
const (

	// Rfc6902PatchOperationOpAdd captures enum value "add"
	Rfc6902PatchOperationOpAdd string = "add"

	// Rfc6902PatchOperationOpRemove captures enum value "remove"
	Rfc6902PatchOperationOpRemove string = "remove"

	// Rfc6902PatchOperationOpReplace captures enum value "replace"
	Rfc6902PatchOperationOpReplace string = "replace"

	// Rfc6902PatchOperationOpMove captures enum value "move"
	Rfc6902PatchOperationOpMove string = "move"

	// Rfc6902PatchOperationOpCopy captures enum value "copy"
	Rfc6902PatchOperationOpCopy string = "copy"

	// Rfc6902PatchOperationOpTest captures enum value "test"
	Rfc6902PatchOperationOpTest string = "test"
)
View Source
const (

	// RoleGrantAuditPayloadRoleAdmin captures enum value "admin"
	RoleGrantAuditPayloadRoleAdmin string = "admin"

	// RoleGrantAuditPayloadRoleBusinessAdmin captures enum value "business_admin"
	RoleGrantAuditPayloadRoleBusinessAdmin string = "business_admin"

	// RoleGrantAuditPayloadRoleAuditor captures enum value "auditor"
	RoleGrantAuditPayloadRoleAuditor string = "auditor"

	// RoleGrantAuditPayloadRoleManager captures enum value "manager"
	RoleGrantAuditPayloadRoleManager string = "manager"

	// RoleGrantAuditPayloadRoleUserManager captures enum value "user_manager"
	RoleGrantAuditPayloadRoleUserManager string = "user_manager"

	// RoleGrantAuditPayloadRoleMember captures enum value "member"
	RoleGrantAuditPayloadRoleMember string = "member"
)
View Source
const (

	// RoleResourceRoleAdmin captures enum value "admin"
	RoleResourceRoleAdmin string = "admin"

	// RoleResourceRoleBusinessAdmin captures enum value "business_admin"
	RoleResourceRoleBusinessAdmin string = "business_admin"

	// RoleResourceRoleAuditor captures enum value "auditor"
	RoleResourceRoleAuditor string = "auditor"

	// RoleResourceRoleManager captures enum value "manager"
	RoleResourceRoleManager string = "manager"

	// RoleResourceRoleUserManager captures enum value "user_manager"
	RoleResourceRoleUserManager string = "user_manager"

	// RoleResourceRoleMember captures enum value "member"
	RoleResourceRoleMember string = "member"
)
View Source
const (

	// RoleResourceTypeTenant captures enum value "tenant"
	RoleResourceTypeTenant string = "tenant"

	// RoleResourceTypeWorkspace captures enum value "workspace"
	RoleResourceTypeWorkspace string = "workspace"

	// RoleResourceTypeIdentityPool captures enum value "identity_pool"
	RoleResourceTypeIdentityPool string = "identity_pool"
)
View Source
const (

	// RoleSubjectTypeIdentityPoolUser captures enum value "identity_pool_user"
	RoleSubjectTypeIdentityPoolUser string = "identity_pool_user"

	// RoleSubjectTypeIdp captures enum value "idp"
	RoleSubjectTypeIdp string = "idp"
)
View Source
const (

	// SMSSettingsProviderTwilio captures enum value "twilio"
	SMSSettingsProviderTwilio string = "twilio"

	// SMSSettingsProviderEmbedded captures enum value "embedded"
	SMSSettingsProviderEmbedded string = "embedded"
)
View Source
const (

	// ScriptExecutionAuditPayloadExecutionPointPostAuthnCtx captures enum value "post_authn_ctx"
	ScriptExecutionAuditPayloadExecutionPointPostAuthnCtx string = "post_authn_ctx"

	// ScriptExecutionAuditPayloadExecutionPointAllowedIdpIds captures enum value "allowed_idp_ids"
	ScriptExecutionAuditPayloadExecutionPointAllowedIdpIds string = "allowed_idp_ids"

	// ScriptExecutionAuditPayloadExecutionPointTokenMinting captures enum value "token_minting"
	ScriptExecutionAuditPayloadExecutionPointTokenMinting string = "token_minting"

	// ScriptExecutionAuditPayloadExecutionPointClientTokenMinting captures enum value "client_token_minting"
	ScriptExecutionAuditPayloadExecutionPointClientTokenMinting string = "client_token_minting"
)
View Source
const (

	// ScriptExecutionPointTypePostAuthnCtx captures enum value "post_authn_ctx"
	ScriptExecutionPointTypePostAuthnCtx string = "post_authn_ctx"

	// ScriptExecutionPointTypeAllowedIdpIds captures enum value "allowed_idp_ids"
	ScriptExecutionPointTypeAllowedIdpIds string = "allowed_idp_ids"

	// ScriptExecutionPointTypeTokenMinting captures enum value "token_minting"
	ScriptExecutionPointTypeTokenMinting string = "token_minting"

	// ScriptExecutionPointTypeClientTokenMinting captures enum value "client_token_minting"
	ScriptExecutionPointTypeClientTokenMinting string = "client_token_minting"
)
View Source
const (

	// ServerAccessTokenStrategyJwt captures enum value "jwt"
	ServerAccessTokenStrategyJwt string = "jwt"

	// ServerAccessTokenStrategyOpaque captures enum value "opaque"
	ServerAccessTokenStrategyOpaque string = "opaque"
)
View Source
const (

	// ServerKeyTypeRsa captures enum value "rsa"
	ServerKeyTypeRsa string = "rsa"

	// ServerKeyTypeEcdsa captures enum value "ecdsa"
	ServerKeyTypeEcdsa string = "ecdsa"

	// ServerKeyTypePs captures enum value "ps"
	ServerKeyTypePs string = "ps"
)
View Source
const (

	// ServerProfileDefault captures enum value "default"
	ServerProfileDefault string = "default"

	// ServerProfileDemo captures enum value "demo"
	ServerProfileDemo string = "demo"

	// ServerProfileWorkforce captures enum value "workforce"
	ServerProfileWorkforce string = "workforce"

	// ServerProfileConsumer captures enum value "consumer"
	ServerProfileConsumer string = "consumer"

	// ServerProfilePartners captures enum value "partners"
	ServerProfilePartners string = "partners"

	// ServerProfileThirdParty captures enum value "third_party"
	ServerProfileThirdParty string = "third_party"

	// ServerProfileFapiAdvanced captures enum value "fapi_advanced"
	ServerProfileFapiAdvanced string = "fapi_advanced"

	// ServerProfileFapiRw captures enum value "fapi_rw"
	ServerProfileFapiRw string = "fapi_rw"

	// ServerProfileFapiRo captures enum value "fapi_ro"
	ServerProfileFapiRo string = "fapi_ro"

	// ServerProfileOpenbankingUkFapiAdvanced captures enum value "openbanking_uk_fapi_advanced"
	ServerProfileOpenbankingUkFapiAdvanced string = "openbanking_uk_fapi_advanced"

	// ServerProfileOpenbankingUk captures enum value "openbanking_uk"
	ServerProfileOpenbankingUk string = "openbanking_uk"

	// ServerProfileOpenbankingBr captures enum value "openbanking_br"
	ServerProfileOpenbankingBr string = "openbanking_br"

	// ServerProfileCdrAustralia captures enum value "cdr_australia"
	ServerProfileCdrAustralia string = "cdr_australia"

	// ServerProfileCdrAustraliaFapiRw captures enum value "cdr_australia_fapi_rw"
	ServerProfileCdrAustraliaFapiRw string = "cdr_australia_fapi_rw"

	// ServerProfileFdx captures enum value "fdx"
	ServerProfileFdx string = "fdx"

	// ServerProfileOpenbankingKsa captures enum value "openbanking_ksa"
	ServerProfileOpenbankingKsa string = "openbanking_ksa"

	// ServerProfileFapi20Security captures enum value "fapi_20_security"
	ServerProfileFapi20Security string = "fapi_20_security"

	// ServerProfileFapi20MessageSigning captures enum value "fapi_20_message_signing"
	ServerProfileFapi20MessageSigning string = "fapi_20_message_signing"

	// ServerProfileConnectID captures enum value "connect_id"
	ServerProfileConnectID string = "connect_id"
)
View Source
const (

	// ServerSubjectFormatHash captures enum value "hash"
	ServerSubjectFormatHash string = "hash"

	// ServerSubjectFormatLegacy captures enum value "legacy"
	ServerSubjectFormatLegacy string = "legacy"
)
View Source
const (

	// ServerTypeAdmin captures enum value "admin"
	ServerTypeAdmin string = "admin"

	// ServerTypeDeveloper captures enum value "developer"
	ServerTypeDeveloper string = "developer"

	// ServerTypeSystem captures enum value "system"
	ServerTypeSystem string = "system"

	// ServerTypeRegular captures enum value "regular"
	ServerTypeRegular string = "regular"

	// ServerTypeOrganization captures enum value "organization"
	ServerTypeOrganization string = "organization"
)
View Source
const (

	// ServerAuditPayloadAccessTokenStrategyJwt captures enum value "jwt"
	ServerAuditPayloadAccessTokenStrategyJwt string = "jwt"

	// ServerAuditPayloadAccessTokenStrategyOpaque captures enum value "opaque"
	ServerAuditPayloadAccessTokenStrategyOpaque string = "opaque"
)
View Source
const (

	// ServerAuditPayloadKeyTypeRsa captures enum value "rsa"
	ServerAuditPayloadKeyTypeRsa string = "rsa"

	// ServerAuditPayloadKeyTypeEcdsa captures enum value "ecdsa"
	ServerAuditPayloadKeyTypeEcdsa string = "ecdsa"

	// ServerAuditPayloadKeyTypePs captures enum value "ps"
	ServerAuditPayloadKeyTypePs string = "ps"
)
View Source
const (

	// ServerAuditPayloadProfileDefault captures enum value "default"
	ServerAuditPayloadProfileDefault string = "default"

	// ServerAuditPayloadProfileDemo captures enum value "demo"
	ServerAuditPayloadProfileDemo string = "demo"

	// ServerAuditPayloadProfileWorkforce captures enum value "workforce"
	ServerAuditPayloadProfileWorkforce string = "workforce"

	// ServerAuditPayloadProfileConsumer captures enum value "consumer"
	ServerAuditPayloadProfileConsumer string = "consumer"

	// ServerAuditPayloadProfilePartners captures enum value "partners"
	ServerAuditPayloadProfilePartners string = "partners"

	// ServerAuditPayloadProfileThirdParty captures enum value "third_party"
	ServerAuditPayloadProfileThirdParty string = "third_party"

	// ServerAuditPayloadProfileFapiAdvanced captures enum value "fapi_advanced"
	ServerAuditPayloadProfileFapiAdvanced string = "fapi_advanced"

	// ServerAuditPayloadProfileFapiRw captures enum value "fapi_rw"
	ServerAuditPayloadProfileFapiRw string = "fapi_rw"

	// ServerAuditPayloadProfileFapiRo captures enum value "fapi_ro"
	ServerAuditPayloadProfileFapiRo string = "fapi_ro"

	// ServerAuditPayloadProfileOpenbankingUkFapiAdvanced captures enum value "openbanking_uk_fapi_advanced"
	ServerAuditPayloadProfileOpenbankingUkFapiAdvanced string = "openbanking_uk_fapi_advanced"

	// ServerAuditPayloadProfileOpenbankingUk captures enum value "openbanking_uk"
	ServerAuditPayloadProfileOpenbankingUk string = "openbanking_uk"

	// ServerAuditPayloadProfileOpenbankingBr captures enum value "openbanking_br"
	ServerAuditPayloadProfileOpenbankingBr string = "openbanking_br"

	// ServerAuditPayloadProfileCdrAustralia captures enum value "cdr_australia"
	ServerAuditPayloadProfileCdrAustralia string = "cdr_australia"

	// ServerAuditPayloadProfileCdrAustraliaFapiRw captures enum value "cdr_australia_fapi_rw"
	ServerAuditPayloadProfileCdrAustraliaFapiRw string = "cdr_australia_fapi_rw"

	// ServerAuditPayloadProfileFdx captures enum value "fdx"
	ServerAuditPayloadProfileFdx string = "fdx"

	// ServerAuditPayloadProfileOpenbankingKsa captures enum value "openbanking_ksa"
	ServerAuditPayloadProfileOpenbankingKsa string = "openbanking_ksa"

	// ServerAuditPayloadProfileFapi20Security captures enum value "fapi_20_security"
	ServerAuditPayloadProfileFapi20Security string = "fapi_20_security"

	// ServerAuditPayloadProfileFapi20MessageSigning captures enum value "fapi_20_message_signing"
	ServerAuditPayloadProfileFapi20MessageSigning string = "fapi_20_message_signing"

	// ServerAuditPayloadProfileConnectID captures enum value "connect_id"
	ServerAuditPayloadProfileConnectID string = "connect_id"
)
View Source
const (

	// ServerAuditPayloadSubjectFormatHash captures enum value "hash"
	ServerAuditPayloadSubjectFormatHash string = "hash"

	// ServerAuditPayloadSubjectFormatLegacy captures enum value "legacy"
	ServerAuditPayloadSubjectFormatLegacy string = "legacy"
)
View Source
const (

	// ServerAuditPayloadTypeAdmin captures enum value "admin"
	ServerAuditPayloadTypeAdmin string = "admin"

	// ServerAuditPayloadTypeDeveloper captures enum value "developer"
	ServerAuditPayloadTypeDeveloper string = "developer"

	// ServerAuditPayloadTypeSystem captures enum value "system"
	ServerAuditPayloadTypeSystem string = "system"

	// ServerAuditPayloadTypeRegular captures enum value "regular"
	ServerAuditPayloadTypeRegular string = "regular"

	// ServerAuditPayloadTypeOrganization captures enum value "organization"
	ServerAuditPayloadTypeOrganization string = "organization"
)
View Source
const (

	// ServerBindingResponseProfileDefault captures enum value "default"
	ServerBindingResponseProfileDefault string = "default"

	// ServerBindingResponseProfileDemo captures enum value "demo"
	ServerBindingResponseProfileDemo string = "demo"

	// ServerBindingResponseProfileWorkforce captures enum value "workforce"
	ServerBindingResponseProfileWorkforce string = "workforce"

	// ServerBindingResponseProfileConsumer captures enum value "consumer"
	ServerBindingResponseProfileConsumer string = "consumer"

	// ServerBindingResponseProfilePartners captures enum value "partners"
	ServerBindingResponseProfilePartners string = "partners"

	// ServerBindingResponseProfileThirdParty captures enum value "third_party"
	ServerBindingResponseProfileThirdParty string = "third_party"

	// ServerBindingResponseProfileFapiAdvanced captures enum value "fapi_advanced"
	ServerBindingResponseProfileFapiAdvanced string = "fapi_advanced"

	// ServerBindingResponseProfileFapiRw captures enum value "fapi_rw"
	ServerBindingResponseProfileFapiRw string = "fapi_rw"

	// ServerBindingResponseProfileFapiRo captures enum value "fapi_ro"
	ServerBindingResponseProfileFapiRo string = "fapi_ro"

	// ServerBindingResponseProfileOpenbankingUkFapiAdvanced captures enum value "openbanking_uk_fapi_advanced"
	ServerBindingResponseProfileOpenbankingUkFapiAdvanced string = "openbanking_uk_fapi_advanced"

	// ServerBindingResponseProfileOpenbankingUk captures enum value "openbanking_uk"
	ServerBindingResponseProfileOpenbankingUk string = "openbanking_uk"

	// ServerBindingResponseProfileOpenbankingBr captures enum value "openbanking_br"
	ServerBindingResponseProfileOpenbankingBr string = "openbanking_br"

	// ServerBindingResponseProfileCdrAustralia captures enum value "cdr_australia"
	ServerBindingResponseProfileCdrAustralia string = "cdr_australia"

	// ServerBindingResponseProfileCdrAustraliaFapiRw captures enum value "cdr_australia_fapi_rw"
	ServerBindingResponseProfileCdrAustraliaFapiRw string = "cdr_australia_fapi_rw"

	// ServerBindingResponseProfileFdx captures enum value "fdx"
	ServerBindingResponseProfileFdx string = "fdx"

	// ServerBindingResponseProfileOpenbankingKsa captures enum value "openbanking_ksa"
	ServerBindingResponseProfileOpenbankingKsa string = "openbanking_ksa"

	// ServerBindingResponseProfileFapi20Security captures enum value "fapi_20_security"
	ServerBindingResponseProfileFapi20Security string = "fapi_20_security"

	// ServerBindingResponseProfileFapi20MessageSigning captures enum value "fapi_20_message_signing"
	ServerBindingResponseProfileFapi20MessageSigning string = "fapi_20_message_signing"

	// ServerBindingResponseProfileConnectID captures enum value "connect_id"
	ServerBindingResponseProfileConnectID string = "connect_id"
)
View Source
const (

	// ServerBindingResponseTypeAdmin captures enum value "admin"
	ServerBindingResponseTypeAdmin string = "admin"

	// ServerBindingResponseTypeDeveloper captures enum value "developer"
	ServerBindingResponseTypeDeveloper string = "developer"

	// ServerBindingResponseTypeSystem captures enum value "system"
	ServerBindingResponseTypeSystem string = "system"

	// ServerBindingResponseTypeRegular captures enum value "regular"
	ServerBindingResponseTypeRegular string = "regular"

	// ServerBindingResponseTypeOrganization captures enum value "organization"
	ServerBindingResponseTypeOrganization string = "organization"
)
View Source
const (

	// ServerInfoProfileDefault captures enum value "default"
	ServerInfoProfileDefault string = "default"

	// ServerInfoProfileDemo captures enum value "demo"
	ServerInfoProfileDemo string = "demo"

	// ServerInfoProfileWorkforce captures enum value "workforce"
	ServerInfoProfileWorkforce string = "workforce"

	// ServerInfoProfileConsumer captures enum value "consumer"
	ServerInfoProfileConsumer string = "consumer"

	// ServerInfoProfilePartners captures enum value "partners"
	ServerInfoProfilePartners string = "partners"

	// ServerInfoProfileThirdParty captures enum value "third_party"
	ServerInfoProfileThirdParty string = "third_party"

	// ServerInfoProfileFapiAdvanced captures enum value "fapi_advanced"
	ServerInfoProfileFapiAdvanced string = "fapi_advanced"

	// ServerInfoProfileFapiRw captures enum value "fapi_rw"
	ServerInfoProfileFapiRw string = "fapi_rw"

	// ServerInfoProfileFapiRo captures enum value "fapi_ro"
	ServerInfoProfileFapiRo string = "fapi_ro"

	// ServerInfoProfileOpenbankingUkFapiAdvanced captures enum value "openbanking_uk_fapi_advanced"
	ServerInfoProfileOpenbankingUkFapiAdvanced string = "openbanking_uk_fapi_advanced"

	// ServerInfoProfileOpenbankingUk captures enum value "openbanking_uk"
	ServerInfoProfileOpenbankingUk string = "openbanking_uk"

	// ServerInfoProfileOpenbankingBr captures enum value "openbanking_br"
	ServerInfoProfileOpenbankingBr string = "openbanking_br"

	// ServerInfoProfileCdrAustralia captures enum value "cdr_australia"
	ServerInfoProfileCdrAustralia string = "cdr_australia"

	// ServerInfoProfileCdrAustraliaFapiRw captures enum value "cdr_australia_fapi_rw"
	ServerInfoProfileCdrAustraliaFapiRw string = "cdr_australia_fapi_rw"

	// ServerInfoProfileFdx captures enum value "fdx"
	ServerInfoProfileFdx string = "fdx"

	// ServerInfoProfileOpenbankingKsa captures enum value "openbanking_ksa"
	ServerInfoProfileOpenbankingKsa string = "openbanking_ksa"

	// ServerInfoProfileFapi20Security captures enum value "fapi_20_security"
	ServerInfoProfileFapi20Security string = "fapi_20_security"

	// ServerInfoProfileFapi20MessageSigning captures enum value "fapi_20_message_signing"
	ServerInfoProfileFapi20MessageSigning string = "fapi_20_message_signing"

	// ServerInfoProfileConnectID captures enum value "connect_id"
	ServerInfoProfileConnectID string = "connect_id"
)
View Source
const (

	// ServerInfoTypeAdmin captures enum value "admin"
	ServerInfoTypeAdmin string = "admin"

	// ServerInfoTypeDeveloper captures enum value "developer"
	ServerInfoTypeDeveloper string = "developer"

	// ServerInfoTypeSystem captures enum value "system"
	ServerInfoTypeSystem string = "system"

	// ServerInfoTypeRegular captures enum value "regular"
	ServerInfoTypeRegular string = "regular"

	// ServerInfoTypeOrganization captures enum value "organization"
	ServerInfoTypeOrganization string = "organization"
)
View Source
const (

	// ServerResponseAccessTokenStrategyJwt captures enum value "jwt"
	ServerResponseAccessTokenStrategyJwt string = "jwt"

	// ServerResponseAccessTokenStrategyOpaque captures enum value "opaque"
	ServerResponseAccessTokenStrategyOpaque string = "opaque"
)
View Source
const (

	// ServerResponseKeyTypeRsa captures enum value "rsa"
	ServerResponseKeyTypeRsa string = "rsa"

	// ServerResponseKeyTypeEcdsa captures enum value "ecdsa"
	ServerResponseKeyTypeEcdsa string = "ecdsa"

	// ServerResponseKeyTypePs captures enum value "ps"
	ServerResponseKeyTypePs string = "ps"
)
View Source
const (

	// ServerResponseProfileDefault captures enum value "default"
	ServerResponseProfileDefault string = "default"

	// ServerResponseProfileDemo captures enum value "demo"
	ServerResponseProfileDemo string = "demo"

	// ServerResponseProfileWorkforce captures enum value "workforce"
	ServerResponseProfileWorkforce string = "workforce"

	// ServerResponseProfileConsumer captures enum value "consumer"
	ServerResponseProfileConsumer string = "consumer"

	// ServerResponseProfilePartners captures enum value "partners"
	ServerResponseProfilePartners string = "partners"

	// ServerResponseProfileThirdParty captures enum value "third_party"
	ServerResponseProfileThirdParty string = "third_party"

	// ServerResponseProfileFapiAdvanced captures enum value "fapi_advanced"
	ServerResponseProfileFapiAdvanced string = "fapi_advanced"

	// ServerResponseProfileFapiRw captures enum value "fapi_rw"
	ServerResponseProfileFapiRw string = "fapi_rw"

	// ServerResponseProfileFapiRo captures enum value "fapi_ro"
	ServerResponseProfileFapiRo string = "fapi_ro"

	// ServerResponseProfileOpenbankingUkFapiAdvanced captures enum value "openbanking_uk_fapi_advanced"
	ServerResponseProfileOpenbankingUkFapiAdvanced string = "openbanking_uk_fapi_advanced"

	// ServerResponseProfileOpenbankingUk captures enum value "openbanking_uk"
	ServerResponseProfileOpenbankingUk string = "openbanking_uk"

	// ServerResponseProfileOpenbankingBr captures enum value "openbanking_br"
	ServerResponseProfileOpenbankingBr string = "openbanking_br"

	// ServerResponseProfileCdrAustralia captures enum value "cdr_australia"
	ServerResponseProfileCdrAustralia string = "cdr_australia"

	// ServerResponseProfileCdrAustraliaFapiRw captures enum value "cdr_australia_fapi_rw"
	ServerResponseProfileCdrAustraliaFapiRw string = "cdr_australia_fapi_rw"

	// ServerResponseProfileFdx captures enum value "fdx"
	ServerResponseProfileFdx string = "fdx"

	// ServerResponseProfileOpenbankingKsa captures enum value "openbanking_ksa"
	ServerResponseProfileOpenbankingKsa string = "openbanking_ksa"

	// ServerResponseProfileFapi20Security captures enum value "fapi_20_security"
	ServerResponseProfileFapi20Security string = "fapi_20_security"

	// ServerResponseProfileFapi20MessageSigning captures enum value "fapi_20_message_signing"
	ServerResponseProfileFapi20MessageSigning string = "fapi_20_message_signing"

	// ServerResponseProfileConnectID captures enum value "connect_id"
	ServerResponseProfileConnectID string = "connect_id"
)
View Source
const (

	// ServerResponseSubjectFormatHash captures enum value "hash"
	ServerResponseSubjectFormatHash string = "hash"

	// ServerResponseSubjectFormatLegacy captures enum value "legacy"
	ServerResponseSubjectFormatLegacy string = "legacy"
)
View Source
const (

	// ServerResponseTypeAdmin captures enum value "admin"
	ServerResponseTypeAdmin string = "admin"

	// ServerResponseTypeDeveloper captures enum value "developer"
	ServerResponseTypeDeveloper string = "developer"

	// ServerResponseTypeSystem captures enum value "system"
	ServerResponseTypeSystem string = "system"

	// ServerResponseTypeRegular captures enum value "regular"
	ServerResponseTypeRegular string = "regular"

	// ServerResponseTypeOrganization captures enum value "organization"
	ServerResponseTypeOrganization string = "organization"
)
View Source
const (

	// ServiceTypeOauth2 captures enum value "oauth2"
	ServiceTypeOauth2 string = "oauth2"

	// ServiceTypeOidc captures enum value "oidc"
	ServiceTypeOidc string = "oidc"

	// ServiceTypeSystem captures enum value "system"
	ServiceTypeSystem string = "system"

	// ServiceTypeUser captures enum value "user"
	ServiceTypeUser string = "user"

	// ServiceTypeOpenbanking captures enum value "openbanking"
	ServiceTypeOpenbanking string = "openbanking"
)
View Source
const (

	// ServiceAuditPayloadTypeOauth2 captures enum value "oauth2"
	ServiceAuditPayloadTypeOauth2 string = "oauth2"

	// ServiceAuditPayloadTypeOidc captures enum value "oidc"
	ServiceAuditPayloadTypeOidc string = "oidc"

	// ServiceAuditPayloadTypeSystem captures enum value "system"
	ServiceAuditPayloadTypeSystem string = "system"

	// ServiceAuditPayloadTypeUser captures enum value "user"
	ServiceAuditPayloadTypeUser string = "user"

	// ServiceAuditPayloadTypeOpenbanking captures enum value "openbanking"
	ServiceAuditPayloadTypeOpenbanking string = "openbanking"
)
View Source
const (

	// ServiceResponseTypeOauth2 captures enum value "oauth2"
	ServiceResponseTypeOauth2 string = "oauth2"

	// ServiceResponseTypeOidc captures enum value "oidc"
	ServiceResponseTypeOidc string = "oidc"

	// ServiceResponseTypeSystem captures enum value "system"
	ServiceResponseTypeSystem string = "system"

	// ServiceResponseTypeUser captures enum value "user"
	ServiceResponseTypeUser string = "user"

	// ServiceResponseTypeOpenbanking captures enum value "openbanking"
	ServiceResponseTypeOpenbanking string = "openbanking"
)
View Source
const (

	// ServiceWithAudienceTypeOauth2 captures enum value "oauth2"
	ServiceWithAudienceTypeOauth2 string = "oauth2"

	// ServiceWithAudienceTypeOidc captures enum value "oidc"
	ServiceWithAudienceTypeOidc string = "oidc"

	// ServiceWithAudienceTypeSystem captures enum value "system"
	ServiceWithAudienceTypeSystem string = "system"

	// ServiceWithAudienceTypeUser captures enum value "user"
	ServiceWithAudienceTypeUser string = "user"

	// ServiceWithAudienceTypeOpenbanking captures enum value "openbanking"
	ServiceWithAudienceTypeOpenbanking string = "openbanking"
)
View Source
const (

	// ServiceWithScopesResponseTypeOauth2 captures enum value "oauth2"
	ServiceWithScopesResponseTypeOauth2 string = "oauth2"

	// ServiceWithScopesResponseTypeOidc captures enum value "oidc"
	ServiceWithScopesResponseTypeOidc string = "oidc"

	// ServiceWithScopesResponseTypeSystem captures enum value "system"
	ServiceWithScopesResponseTypeSystem string = "system"

	// ServiceWithScopesResponseTypeUser captures enum value "user"
	ServiceWithScopesResponseTypeUser string = "user"

	// ServiceWithScopesResponseTypeOpenbanking captures enum value "openbanking"
	ServiceWithScopesResponseTypeOpenbanking string = "openbanking"
)
View Source
const (

	// TenantRoleSubjectTypeIdentityPoolUser captures enum value "identity_pool_user"
	TenantRoleSubjectTypeIdentityPoolUser string = "identity_pool_user"

	// TenantRoleSubjectTypeIdp captures enum value "idp"
	TenantRoleSubjectTypeIdp string = "idp"
)
View Source
const (

	// UpdateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP"
	UpdateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP"

	// UpdateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	UpdateClientAdminRequestAuthorizationEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// UpdateClientAdminRequestAuthorizationEncryptedResponseEncA256GCM captures enum value "A256GCM"
	UpdateClientAdminRequestAuthorizationEncryptedResponseEncA256GCM string = "A256GCM"

	// UpdateClientAdminRequestAuthorizationEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	UpdateClientAdminRequestAuthorizationEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// UpdateClientAdminRequestClientStatusActive captures enum value "active"
	UpdateClientAdminRequestClientStatusActive string = "active"

	// UpdateClientAdminRequestClientStatusInactive captures enum value "inactive"
	UpdateClientAdminRequestClientStatusInactive string = "inactive"
)
View Source
const (

	// UpdateClientAdminRequestClientTypeOauth2 captures enum value "oauth2"
	UpdateClientAdminRequestClientTypeOauth2 string = "oauth2"

	// UpdateClientAdminRequestClientTypeSaml captures enum value "saml"
	UpdateClientAdminRequestClientTypeSaml string = "saml"
)
View Source
const (

	// UpdateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEP captures enum value "RSA-OAEP"
	UpdateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEP string = "RSA-OAEP"

	// UpdateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	UpdateClientAdminRequestIDTokenEncryptedResponseAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// UpdateClientAdminRequestIDTokenEncryptedResponseEncA256GCM captures enum value "A256GCM"
	UpdateClientAdminRequestIDTokenEncryptedResponseEncA256GCM string = "A256GCM"

	// UpdateClientAdminRequestIDTokenEncryptedResponseEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	UpdateClientAdminRequestIDTokenEncryptedResponseEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// UpdateClientAdminRequestIDTokenSignedResponseAlgRS256 captures enum value "RS256"
	UpdateClientAdminRequestIDTokenSignedResponseAlgRS256 string = "RS256"

	// UpdateClientAdminRequestIDTokenSignedResponseAlgES256 captures enum value "ES256"
	UpdateClientAdminRequestIDTokenSignedResponseAlgES256 string = "ES256"

	// UpdateClientAdminRequestIDTokenSignedResponseAlgPS256 captures enum value "PS256"
	UpdateClientAdminRequestIDTokenSignedResponseAlgPS256 string = "PS256"
)
View Source
const (

	// UpdateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	UpdateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// UpdateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	UpdateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// UpdateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	UpdateClientAdminRequestIntrospectionEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// UpdateClientAdminRequestIntrospectionEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	UpdateClientAdminRequestIntrospectionEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// UpdateClientAdminRequestIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	UpdateClientAdminRequestIntrospectionEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// UpdateClientAdminRequestIntrospectionEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	UpdateClientAdminRequestIntrospectionEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// UpdateClientAdminRequestIntrospectionEndpointAuthMethodNone captures enum value "none"
	UpdateClientAdminRequestIntrospectionEndpointAuthMethodNone string = "none"
)
View Source
const (

	// UpdateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEP captures enum value "RSA-OAEP"
	UpdateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEP string = "RSA-OAEP"

	// UpdateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEPDash256 captures enum value "RSA-OAEP-256"
	UpdateClientAdminRequestRequestObjectEncryptionAlgRSADashOAEPDash256 string = "RSA-OAEP-256"
)
View Source
const (

	// UpdateClientAdminRequestRequestObjectEncryptionEncA256GCM captures enum value "A256GCM"
	UpdateClientAdminRequestRequestObjectEncryptionEncA256GCM string = "A256GCM"

	// UpdateClientAdminRequestRequestObjectEncryptionEncA128CBCDashHS256 captures enum value "A128CBC-HS256"
	UpdateClientAdminRequestRequestObjectEncryptionEncA128CBCDashHS256 string = "A128CBC-HS256"
)
View Source
const (

	// UpdateClientAdminRequestRequestObjectSigningAlgAny captures enum value "any"
	UpdateClientAdminRequestRequestObjectSigningAlgAny string = "any"

	// UpdateClientAdminRequestRequestObjectSigningAlgNone captures enum value "none"
	UpdateClientAdminRequestRequestObjectSigningAlgNone string = "none"

	// UpdateClientAdminRequestRequestObjectSigningAlgRS256 captures enum value "RS256"
	UpdateClientAdminRequestRequestObjectSigningAlgRS256 string = "RS256"

	// UpdateClientAdminRequestRequestObjectSigningAlgES256 captures enum value "ES256"
	UpdateClientAdminRequestRequestObjectSigningAlgES256 string = "ES256"

	// UpdateClientAdminRequestRequestObjectSigningAlgPS256 captures enum value "PS256"
	UpdateClientAdminRequestRequestObjectSigningAlgPS256 string = "PS256"
)
View Source
const (

	// UpdateClientAdminRequestRevocationEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	UpdateClientAdminRequestRevocationEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// UpdateClientAdminRequestRevocationEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	UpdateClientAdminRequestRevocationEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// UpdateClientAdminRequestRevocationEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	UpdateClientAdminRequestRevocationEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// UpdateClientAdminRequestRevocationEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	UpdateClientAdminRequestRevocationEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// UpdateClientAdminRequestRevocationEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	UpdateClientAdminRequestRevocationEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// UpdateClientAdminRequestRevocationEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	UpdateClientAdminRequestRevocationEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// UpdateClientAdminRequestRevocationEndpointAuthMethodNone captures enum value "none"
	UpdateClientAdminRequestRevocationEndpointAuthMethodNone string = "none"
)
View Source
const (

	// UpdateClientAdminRequestSubjectTypePublic captures enum value "public"
	UpdateClientAdminRequestSubjectTypePublic string = "public"

	// UpdateClientAdminRequestSubjectTypePairwise captures enum value "pairwise"
	UpdateClientAdminRequestSubjectTypePairwise string = "pairwise"
)
View Source
const (

	// UpdateClientAdminRequestTokenEndpointAuthMethodClientSecretBasic captures enum value "client_secret_basic"
	UpdateClientAdminRequestTokenEndpointAuthMethodClientSecretBasic string = "client_secret_basic"

	// UpdateClientAdminRequestTokenEndpointAuthMethodClientSecretPost captures enum value "client_secret_post"
	UpdateClientAdminRequestTokenEndpointAuthMethodClientSecretPost string = "client_secret_post"

	// UpdateClientAdminRequestTokenEndpointAuthMethodClientSecretJwt captures enum value "client_secret_jwt"
	UpdateClientAdminRequestTokenEndpointAuthMethodClientSecretJwt string = "client_secret_jwt"

	// UpdateClientAdminRequestTokenEndpointAuthMethodPrivateKeyJwt captures enum value "private_key_jwt"
	UpdateClientAdminRequestTokenEndpointAuthMethodPrivateKeyJwt string = "private_key_jwt"

	// UpdateClientAdminRequestTokenEndpointAuthMethodSelfSignedTLSClientAuth captures enum value "self_signed_tls_client_auth"
	UpdateClientAdminRequestTokenEndpointAuthMethodSelfSignedTLSClientAuth string = "self_signed_tls_client_auth"

	// UpdateClientAdminRequestTokenEndpointAuthMethodTLSClientAuth captures enum value "tls_client_auth"
	UpdateClientAdminRequestTokenEndpointAuthMethodTLSClientAuth string = "tls_client_auth"

	// UpdateClientAdminRequestTokenEndpointAuthMethodNone captures enum value "none"
	UpdateClientAdminRequestTokenEndpointAuthMethodNone string = "none"
)
View Source
const (

	// UpdateClientAdminRequestTokenEndpointAuthSigningAlgRS256 captures enum value "RS256"
	UpdateClientAdminRequestTokenEndpointAuthSigningAlgRS256 string = "RS256"

	// UpdateClientAdminRequestTokenEndpointAuthSigningAlgES256 captures enum value "ES256"
	UpdateClientAdminRequestTokenEndpointAuthSigningAlgES256 string = "ES256"

	// UpdateClientAdminRequestTokenEndpointAuthSigningAlgPS256 captures enum value "PS256"
	UpdateClientAdminRequestTokenEndpointAuthSigningAlgPS256 string = "PS256"

	// UpdateClientAdminRequestTokenEndpointAuthSigningAlgHS256 captures enum value "HS256"
	UpdateClientAdminRequestTokenEndpointAuthSigningAlgHS256 string = "HS256"

	// UpdateClientAdminRequestTokenEndpointAuthSigningAlgEmpty captures enum value ""
	UpdateClientAdminRequestTokenEndpointAuthSigningAlgEmpty string = ""
)
View Source
const (

	// UpdateClientAdminRequestUserinfoSignedResponseAlgNone captures enum value "none"
	UpdateClientAdminRequestUserinfoSignedResponseAlgNone string = "none"

	// UpdateClientAdminRequestUserinfoSignedResponseAlgRS256 captures enum value "RS256"
	UpdateClientAdminRequestUserinfoSignedResponseAlgRS256 string = "RS256"

	// UpdateClientAdminRequestUserinfoSignedResponseAlgES256 captures enum value "ES256"
	UpdateClientAdminRequestUserinfoSignedResponseAlgES256 string = "ES256"
)
View Source
const (

	// UserPayloadStatusActive captures enum value "active"
	UserPayloadStatusActive string = "active"

	// UserPayloadStatusInactive captures enum value "inactive"
	UserPayloadStatusInactive string = "inactive"

	// UserPayloadStatusDeleted captures enum value "deleted"
	UserPayloadStatusDeleted string = "deleted"

	// UserPayloadStatusNew captures enum value "new"
	UserPayloadStatusNew string = "new"
)
View Source
const (

	// WorkspaceResponseProfileDefault captures enum value "default"
	WorkspaceResponseProfileDefault string = "default"

	// WorkspaceResponseProfileDemo captures enum value "demo"
	WorkspaceResponseProfileDemo string = "demo"

	// WorkspaceResponseProfileWorkforce captures enum value "workforce"
	WorkspaceResponseProfileWorkforce string = "workforce"

	// WorkspaceResponseProfileConsumer captures enum value "consumer"
	WorkspaceResponseProfileConsumer string = "consumer"

	// WorkspaceResponseProfilePartners captures enum value "partners"
	WorkspaceResponseProfilePartners string = "partners"

	// WorkspaceResponseProfileThirdParty captures enum value "third_party"
	WorkspaceResponseProfileThirdParty string = "third_party"

	// WorkspaceResponseProfileFapiAdvanced captures enum value "fapi_advanced"
	WorkspaceResponseProfileFapiAdvanced string = "fapi_advanced"

	// WorkspaceResponseProfileFapiRw captures enum value "fapi_rw"
	WorkspaceResponseProfileFapiRw string = "fapi_rw"

	// WorkspaceResponseProfileFapiRo captures enum value "fapi_ro"
	WorkspaceResponseProfileFapiRo string = "fapi_ro"

	// WorkspaceResponseProfileOpenbankingUkFapiAdvanced captures enum value "openbanking_uk_fapi_advanced"
	WorkspaceResponseProfileOpenbankingUkFapiAdvanced string = "openbanking_uk_fapi_advanced"

	// WorkspaceResponseProfileOpenbankingUk captures enum value "openbanking_uk"
	WorkspaceResponseProfileOpenbankingUk string = "openbanking_uk"

	// WorkspaceResponseProfileOpenbankingBr captures enum value "openbanking_br"
	WorkspaceResponseProfileOpenbankingBr string = "openbanking_br"

	// WorkspaceResponseProfileCdrAustralia captures enum value "cdr_australia"
	WorkspaceResponseProfileCdrAustralia string = "cdr_australia"

	// WorkspaceResponseProfileCdrAustraliaFapiRw captures enum value "cdr_australia_fapi_rw"
	WorkspaceResponseProfileCdrAustraliaFapiRw string = "cdr_australia_fapi_rw"

	// WorkspaceResponseProfileFdx captures enum value "fdx"
	WorkspaceResponseProfileFdx string = "fdx"

	// WorkspaceResponseProfileOpenbankingKsa captures enum value "openbanking_ksa"
	WorkspaceResponseProfileOpenbankingKsa string = "openbanking_ksa"

	// WorkspaceResponseProfileFapi20Security captures enum value "fapi_20_security"
	WorkspaceResponseProfileFapi20Security string = "fapi_20_security"

	// WorkspaceResponseProfileFapi20MessageSigning captures enum value "fapi_20_message_signing"
	WorkspaceResponseProfileFapi20MessageSigning string = "fapi_20_message_signing"

	// WorkspaceResponseProfileConnectID captures enum value "connect_id"
	WorkspaceResponseProfileConnectID string = "connect_id"
)
View Source
const (

	// WorkspaceResponseSubjectFormatHash captures enum value "hash"
	WorkspaceResponseSubjectFormatHash string = "hash"

	// WorkspaceResponseSubjectFormatLegacy captures enum value "legacy"
	WorkspaceResponseSubjectFormatLegacy string = "legacy"
)
View Source
const (

	// WorkspaceResponseTypeAdmin captures enum value "admin"
	WorkspaceResponseTypeAdmin string = "admin"

	// WorkspaceResponseTypeDeveloper captures enum value "developer"
	WorkspaceResponseTypeDeveloper string = "developer"

	// WorkspaceResponseTypeSystem captures enum value "system"
	WorkspaceResponseTypeSystem string = "system"

	// WorkspaceResponseTypeRegular captures enum value "regular"
	WorkspaceResponseTypeRegular string = "regular"

	// WorkspaceResponseTypeOrganization captures enum value "organization"
	WorkspaceResponseTypeOrganization string = "organization"
)
View Source
const (

	// WorkspaceRoleSubjectTypeIdentityPoolUser captures enum value "identity_pool_user"
	WorkspaceRoleSubjectTypeIdentityPoolUser string = "identity_pool_user"

	// WorkspaceRoleSubjectTypeIdp captures enum value "idp"
	WorkspaceRoleSubjectTypeIdp string = "idp"
)
View Source
const (

	// CDRArrangementSpecVersionV1 captures enum value "v1"
	CDRArrangementSpecVersionV1 string = "v1"
)
View Source
const (

	// CustomAppResponseTypePostDashAuthn captures enum value "post-authn"
	CustomAppResponseTypePostDashAuthn string = "post-authn"
)
View Source
const (

	// CustomAppTypePostDashAuthn captures enum value "post-authn"
	CustomAppTypePostDashAuthn string = "post-authn"
)
View Source
const (

	// GrantIdentityPoolRoleRequestRoleUserManager captures enum value "user_manager"
	GrantIdentityPoolRoleRequestRoleUserManager string = "user_manager"
)
View Source
const (

	// RevokeIdentityPoolRoleRequestRoleUserManager captures enum value "user_manager"
	RevokeIdentityPoolRoleRequestRoleUserManager string = "user_manager"
)

Variables ¶

This section is empty.

Functions ¶

This section is empty.

Types ¶

type API ¶

type API struct {

	// api type
	// Example: rest
	// Enum: [rest graphql]
	APIType string `json:"api_type,omitempty" yaml:"api_type,omitempty"`

	// if false it is not possible to assign a policy
	CanHavePolicy bool `json:"can_have_policy,omitempty" yaml:"can_have_policy,omitempty"`

	// Data classifications
	DataClassifications []string `json:"data_classifications" yaml:"data_classifications"`

	// graphql schema
	GraphqlSchema string `json:"graphql_schema,omitempty" yaml:"graphql_schema,omitempty"`

	// graphql types
	GraphqlTypes GraphQLTypes `json:"graphql_types,omitempty" yaml:"graphql_types,omitempty"`

	// API id
	// Example: 1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// HTTP request method
	// Example: GET
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// HTTP request path
	// Example: /pets
	Path string `json:"path,omitempty" yaml:"path,omitempty"`

	// optional id of a policy
	// Example: block
	PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"`

	// position of the api in the apis list
	// Example: 1
	Position int64 `json:"position,omitempty" yaml:"position,omitempty"`

	// server id
	// Example: default
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// service id
	// Example: 1
	ServiceID string `json:"service_id,omitempty" yaml:"service_id,omitempty"`

	// tenant id
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`
}

API API

swagger:model API

func (*API) ContextValidate ¶

func (m *API) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this API based on the context it is used

func (*API) MarshalBinary ¶

func (m *API) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*API) UnmarshalBinary ¶

func (m *API) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*API) Validate ¶

func (m *API) Validate(formats strfmt.Registry) error

Validate validates this API

type APIGroupMetadata ¶

type APIGroupMetadata struct {

	// apigee
	Apigee *ApigeeMetadata `json:"apigee,omitempty" yaml:"apigee,omitempty"`

	// aws
	Aws *AWSMetadata `json:"aws,omitempty" yaml:"aws,omitempty"`

	// azure
	Azure *AzureMetadata `json:"azure,omitempty" yaml:"azure,omitempty"`

	// Gateway type
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

APIGroupMetadata API group metadata

swagger:model APIGroupMetadata

func (*APIGroupMetadata) ContextValidate ¶

func (m *APIGroupMetadata) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this API group metadata based on the context it is used

func (*APIGroupMetadata) MarshalBinary ¶

func (m *APIGroupMetadata) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*APIGroupMetadata) UnmarshalBinary ¶

func (m *APIGroupMetadata) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*APIGroupMetadata) Validate ¶

func (m *APIGroupMetadata) Validate(formats strfmt.Registry) error

Validate validates this API group metadata

type APIs ¶

type APIs struct {

	// apis
	Apis []*API `json:"apis" yaml:"apis"`
}

APIs a p is

swagger:model APIs

func (*APIs) ContextValidate ¶

func (m *APIs) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this a p is based on the context it is used

func (*APIs) MarshalBinary ¶

func (m *APIs) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*APIs) UnmarshalBinary ¶

func (m *APIs) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*APIs) Validate ¶

func (m *APIs) Validate(formats strfmt.Registry) error

Validate validates this a p is

type AWSMetadata ¶

type AWSMetadata struct {

	// api id
	APIID string `json:"api_id,omitempty" yaml:"api_id,omitempty"`

	// api name
	APIName string `json:"api_name,omitempty" yaml:"api_name,omitempty"`

	// stage
	Stage string `json:"stage,omitempty" yaml:"stage,omitempty"`
}

AWSMetadata a w s metadata

swagger:model AWSMetadata

func (*AWSMetadata) ContextValidate ¶

func (m *AWSMetadata) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this a w s metadata based on context it is used

func (*AWSMetadata) MarshalBinary ¶

func (m *AWSMetadata) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AWSMetadata) UnmarshalBinary ¶

func (m *AWSMetadata) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AWSMetadata) Validate ¶

func (m *AWSMetadata) Validate(formats strfmt.Registry) error

Validate validates this a w s metadata

type AccessRequestData ¶

type AccessRequestData struct {

	// Actor claims
	ActorClaims map[string]interface{} `json:"actor_claims,omitempty" yaml:"actor_claims,omitempty"`

	// OAuth client application identifier.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// Human readable name of a client application
	ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"`

	// Stores information if the owner of the client application is a developer.
	CreatedByDeveloper bool `json:"created_by_developer,omitempty" yaml:"created_by_developer,omitempty"`

	// Stores the information which grant type was selected to perfom a given action.
	// Matches one of allowed OAuth client grant types for a given client.
	GrantType string `json:"grant_type,omitempty" yaml:"grant_type,omitempty"`

	// ID of the Identity Pool
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// May act claims
	MayActClaims map[string]interface{} `json:"may_act_claims,omitempty" yaml:"may_act_claims,omitempty"`

	// Stores information if the client application is a public one.
	Public bool `json:"public,omitempty" yaml:"public,omitempty"`

	// Requester IP address obtained from system network socket information.
	RemoteAddr string `json:"remote_addr,omitempty" yaml:"remote_addr,omitempty"`

	// ID of the authorization server (workspace) to which an access request is tied.
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// Session id of a given subject. It's uniform across the authentication processes.
	// It can be used as a correlation ID between a different audit events.
	SessionID string `json:"session_id,omitempty" yaml:"session_id,omitempty"`

	// Identification of the principal that is the subject of authorization.
	// For the authorization grant, the subject typically identifies an authorized accessor for which the access token is being requested.
	// For client authentication, the subject is the client_id of the OAuth client.
	Subject string `json:"subject,omitempty" yaml:"subject,omitempty"`

	// Stores information if the client application is a system tenant's application.
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// Token endpoint authentication method configured for a client application.
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	TokenEndpointAuthnMethod string `json:"token_endpoint_authn_method,omitempty" yaml:"token_endpoint_authn_method,omitempty"`

	// Token signature
	TokenSignature string `json:"token_signature,omitempty" yaml:"token_signature,omitempty"`

	// Requester IP address obtained from True-Client-IP header.
	TrueClientIP string `json:"true_client_ip,omitempty" yaml:"true_client_ip,omitempty"`

	// A characteristic string that lets servers and network peers identify the application, operating system, vendor, and/or version of the requesting user agent.
	UserAgent string `json:"user_agent,omitempty" yaml:"user_agent,omitempty"`

	// ID of the authorization server (workspace) to which a resource is tied.
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`

	// Requester IP address obtained from X-Forwarded-For header.
	XForwardedFor string `json:"x_forwarded_for,omitempty" yaml:"x_forwarded_for,omitempty"`

	// Requester IP address obtained from X-Real-IP header.
	XRealIP string `json:"x_real_ip,omitempty" yaml:"x_real_ip,omitempty"`
}

AccessRequestData access request data

swagger:model AccessRequestData

func (*AccessRequestData) ContextValidate ¶

func (m *AccessRequestData) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this access request data based on context it is used

func (*AccessRequestData) MarshalBinary ¶

func (m *AccessRequestData) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AccessRequestData) UnmarshalBinary ¶

func (m *AccessRequestData) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AccessRequestData) Validate ¶

func (m *AccessRequestData) Validate(formats strfmt.Registry) error

Validate validates this access request data

type AccessRequestDataWithError ¶

type AccessRequestDataWithError struct {

	// Actor claims
	ActorClaims map[string]interface{} `json:"actor_claims,omitempty" yaml:"actor_claims,omitempty"`

	// OAuth client application identifier.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// Human readable name of a client application
	ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"`

	// Stores information if the owner of the client application is a developer.
	CreatedByDeveloper bool `json:"created_by_developer,omitempty" yaml:"created_by_developer,omitempty"`

	// High level error name (request_forbidden, access_denied, invalid_request).
	Error string `json:"error,omitempty" yaml:"error,omitempty"`

	// Error root cause (invalid_pkce, invalid_state, user_policy_failed).
	ErrorCause string `json:"error_cause,omitempty" yaml:"error_cause,omitempty"`

	// Human readable error description
	ErrorDescription string `json:"error_description,omitempty" yaml:"error_description,omitempty"`

	// Error hint
	ErrorHint string `json:"error_hint,omitempty" yaml:"error_hint,omitempty"`

	// External error
	ExternalError bool `json:"external_error,omitempty" yaml:"external_error,omitempty"`

	// Stores the information which grant type was selected to perfom a given action.
	// Matches one of allowed OAuth client grant types for a given client.
	GrantType string `json:"grant_type,omitempty" yaml:"grant_type,omitempty"`

	// ID of the Identity Pool
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// May act claims
	MayActClaims map[string]interface{} `json:"may_act_claims,omitempty" yaml:"may_act_claims,omitempty"`

	// Stores information if the client application is a public one.
	Public bool `json:"public,omitempty" yaml:"public,omitempty"`

	// Requester IP address obtained from system network socket information.
	RemoteAddr string `json:"remote_addr,omitempty" yaml:"remote_addr,omitempty"`

	// ID of the authorization server (workspace) to which an access request is tied.
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// Session id of a given subject. It's uniform across the authentication processes.
	// It can be used as a correlation ID between a different audit events.
	SessionID string `json:"session_id,omitempty" yaml:"session_id,omitempty"`

	// Identification of the principal that is the subject of authorization.
	// For the authorization grant, the subject typically identifies an authorized accessor for which the access token is being requested.
	// For client authentication, the subject is the client_id of the OAuth client.
	Subject string `json:"subject,omitempty" yaml:"subject,omitempty"`

	// Stores information if the client application is a system tenant's application.
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// Token endpoint authentication method configured for a client application.
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	TokenEndpointAuthnMethod string `json:"token_endpoint_authn_method,omitempty" yaml:"token_endpoint_authn_method,omitempty"`

	// Token signature
	TokenSignature string `json:"token_signature,omitempty" yaml:"token_signature,omitempty"`

	// Requester IP address obtained from True-Client-IP header.
	TrueClientIP string `json:"true_client_ip,omitempty" yaml:"true_client_ip,omitempty"`

	// A characteristic string that lets servers and network peers identify the application, operating system, vendor, and/or version of the requesting user agent.
	UserAgent string `json:"user_agent,omitempty" yaml:"user_agent,omitempty"`

	// ID of the authorization server (workspace) to which a resource is tied.
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`

	// Requester IP address obtained from X-Forwarded-For header.
	XForwardedFor string `json:"x_forwarded_for,omitempty" yaml:"x_forwarded_for,omitempty"`

	// Requester IP address obtained from X-Real-IP header.
	XRealIP string `json:"x_real_ip,omitempty" yaml:"x_real_ip,omitempty"`
}

AccessRequestDataWithError access request data with error

swagger:model AccessRequestDataWithError

func (*AccessRequestDataWithError) ContextValidate ¶

func (m *AccessRequestDataWithError) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this access request data with error based on context it is used

func (*AccessRequestDataWithError) MarshalBinary ¶

func (m *AccessRequestDataWithError) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AccessRequestDataWithError) UnmarshalBinary ¶

func (m *AccessRequestDataWithError) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AccessRequestDataWithError) Validate ¶

func (m *AccessRequestDataWithError) Validate(formats strfmt.Registry) error

Validate validates this access request data with error

type AdvancedConfiguration ¶

type AdvancedConfiguration struct {

	// Configurable ACR values to enforce during auth flow
	AcrValues []string `json:"acr_values" yaml:"acr_values"`

	// This option overrides all urls advertised by the well known endpoint with their mtls alias
	AdvertiseOnlyMtlsAliasesInWellKnown bool `json:"advertise_only_mtls_aliases_in_well_known,omitempty" yaml:"advertise_only_mtls_aliases_in_well_known,omitempty"`

	// Block response modes
	BlockResponseModes bool `json:"block_response_modes,omitempty" yaml:"block_response_modes,omitempty"`

	// Disable certificate-bound access tokens for new DCR clients
	//
	// If true, new DCR clients are created with CertificateBoundAccessToken disabled.
	DisableDcrClientCertificateBoundAccessTokens bool `` /* 135-byte string literal not displayed */

	// Disable PAR
	DisablePar bool `json:"disable_par,omitempty" yaml:"disable_par,omitempty"`

	// Disable RAR
	DisableRar bool `json:"disable_rar,omitempty" yaml:"disable_rar,omitempty"`

	// Disable refresh token cycling
	//
	// Once disabled, original refresh token can be constantly used to issue new access token.
	DisableRefreshTokenCycling bool `json:"disable_refresh_token_cycling,omitempty" yaml:"disable_refresh_token_cycling,omitempty"`

	// When enabled, the authorization server will not accept access tokens supplied in the request query parameter
	// for protected resources endpoints.
	DisallowAccessTokenInQueryForProtectedResources bool `` /* 143-byte string literal not displayed */

	// Disallow code response type without JARM
	DisallowCodeResponseTypeWithoutJarm bool `json:"disallow_code_response_type_without_jarm,omitempty" yaml:"disallow_code_response_type_without_jarm,omitempty"`

	// disallowed response modes
	DisallowedResponseModes ResponseModes `json:"disallowed_response_modes,omitempty" yaml:"disallowed_response_modes,omitempty"`

	// Enforce acr values
	EnforceAcrValues bool `json:"enforce_acr_values,omitempty" yaml:"enforce_acr_values,omitempty"`

	// Ignore unknown scopes for DCR
	//
	// If enabled, an attempt to register or update a client with a scope that does not exist in the server will succeed.
	IgnoreUnknownScopesForDcr bool `json:"ignore_unknown_scopes_for_dcr,omitempty" yaml:"ignore_unknown_scopes_for_dcr,omitempty"`

	// Require request or request uri parameter for authorization flow
	RequireRequestOrRequestURIParameter bool `json:"require_request_or_request_uri_parameter,omitempty" yaml:"require_request_or_request_uri_parameter,omitempty"`

	// Return iss parameter in the authorization response
	ReturnIssParameterInAuthorizationResponse bool `` /* 127-byte string literal not displayed */
}

AdvancedConfiguration advanced configuration

swagger:model AdvancedConfiguration

func (*AdvancedConfiguration) ContextValidate ¶

func (m *AdvancedConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this advanced configuration based on the context it is used

func (*AdvancedConfiguration) MarshalBinary ¶

func (m *AdvancedConfiguration) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AdvancedConfiguration) UnmarshalBinary ¶

func (m *AdvancedConfiguration) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AdvancedConfiguration) Validate ¶

func (m *AdvancedConfiguration) Validate(formats strfmt.Registry) error

Validate validates this advanced configuration

type AffiliationDescriptor ¶

type AffiliationDescriptor struct {

	// affiliate members
	AffiliateMembers []string `json:"AffiliateMembers" yaml:"AffiliateMembers"`

	// affiliation owner ID
	AffiliationOwnerID string `json:"AffiliationOwnerID,omitempty" yaml:"AffiliationOwnerID,omitempty"`

	// cache duration
	CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"`

	// ID
	ID string `json:"ID,omitempty" yaml:"ID,omitempty"`

	// key descriptors
	KeyDescriptors []*KeyDescriptor `json:"KeyDescriptors" yaml:"KeyDescriptors"`

	// signature
	Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"`

	// valid until
	// Format: date-time
	ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"`
}

AffiliationDescriptor AffiliationDescriptor represents the SAML AffiliationDescriptor object.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.5

swagger:model AffiliationDescriptor

func (*AffiliationDescriptor) ContextValidate ¶

func (m *AffiliationDescriptor) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this affiliation descriptor based on the context it is used

func (*AffiliationDescriptor) MarshalBinary ¶

func (m *AffiliationDescriptor) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AffiliationDescriptor) UnmarshalBinary ¶

func (m *AffiliationDescriptor) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AffiliationDescriptor) Validate ¶

func (m *AffiliationDescriptor) Validate(formats strfmt.Registry) error

Validate validates this affiliation descriptor

type ApigeeMetadata ¶

type ApigeeMetadata struct {

	// Apigee environment name. It's a uniqe, immutable name of an environment for a given proxy name.
	// Example: my-default-proxy
	// Required: true
	EnvironmentName string `json:"environment_name" yaml:"environment_name"`

	// Apigee organization name. It's a uniqe, immutable name of an Apigee organization.
	// Example: apigee-x-905913
	// Required: true
	OrganizationName string `json:"organization_name" yaml:"organization_name"`

	// Apigee proxy name. It's a uniqe, immutable name of a proxy for a given organization id.
	// Example: my-default-proxy
	// Required: true
	ProxyName string `json:"proxy_name" yaml:"proxy_name"`
}

ApigeeMetadata apigee metadata

swagger:model ApigeeMetadata

func (*ApigeeMetadata) ContextValidate ¶

func (m *ApigeeMetadata) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this apigee metadata based on context it is used

func (*ApigeeMetadata) MarshalBinary ¶

func (m *ApigeeMetadata) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ApigeeMetadata) UnmarshalBinary ¶

func (m *ApigeeMetadata) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ApigeeMetadata) Validate ¶

func (m *ApigeeMetadata) Validate(formats strfmt.Registry) error

Validate validates this apigee metadata

type Attr ¶

type Attr struct {

	// space
	Space string `json:"Space,omitempty" yaml:"Space,omitempty"`

	// value
	Value string `json:"Value,omitempty" yaml:"Value,omitempty"`
}

Attr An Attr represents a key-value attribute within an XML element.

swagger:model Attr

func (*Attr) ContextValidate ¶

func (m *Attr) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this attr based on context it is used

func (*Attr) MarshalBinary ¶

func (m *Attr) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Attr) UnmarshalBinary ¶

func (m *Attr) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Attr) Validate ¶

func (m *Attr) Validate(formats strfmt.Registry) error

Validate validates this attr

type Attribute ¶

type Attribute struct {

	// String represented display name of an attribute
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Array of Strings represents attribute labels
	Labels []string `json:"labels" yaml:"labels"`

	// String represented variable name of an attribute
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// The data type of an attribute
	//
	// It stores information what kind of data is used as the value of the attribute.
	//
	// Available types: `number`, `string`, `bool`, `object`, `number_array`, `string_array`, `bool_array`, `object_array` or `any`.
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

Attribute Authentication context attribute

swagger:model Attribute

func (*Attribute) ContextValidate ¶

func (m *Attribute) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this attribute based on context it is used

func (*Attribute) MarshalBinary ¶

func (m *Attribute) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Attribute) UnmarshalBinary ¶

func (m *Attribute) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Attribute) Validate ¶

func (m *Attribute) Validate(formats strfmt.Registry) error

Validate validates this attribute

type AttributeAuthorityDescriptor ¶

type AttributeAuthorityDescriptor struct {

	// assertion ID request services
	AssertionIDRequestServices []*Endpoint `json:"AssertionIDRequestServices" yaml:"AssertionIDRequestServices"`

	// attribute profiles
	AttributeProfiles []string `json:"AttributeProfiles" yaml:"AttributeProfiles"`

	// attribute services
	AttributeServices []*Endpoint `json:"AttributeServices" yaml:"AttributeServices"`

	// attributes
	Attributes []*Attribute `json:"Attributes" yaml:"Attributes"`

	// cache duration
	CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"`

	// contact people
	ContactPeople []*ContactPerson `json:"ContactPeople" yaml:"ContactPeople"`

	// error URL
	ErrorURL string `json:"ErrorURL,omitempty" yaml:"ErrorURL,omitempty"`

	// ID
	ID string `json:"ID,omitempty" yaml:"ID,omitempty"`

	// key descriptors
	KeyDescriptors []*KeyDescriptor `json:"KeyDescriptors" yaml:"KeyDescriptors"`

	// name ID formats
	NameIDFormats []NameIDFormat `json:"NameIDFormats" yaml:"NameIDFormats"`

	// organization
	Organization *Organization `json:"Organization,omitempty" yaml:"Organization,omitempty"`

	// protocol support enumeration
	ProtocolSupportEnumeration string `json:"ProtocolSupportEnumeration,omitempty" yaml:"ProtocolSupportEnumeration,omitempty"`

	// signature
	Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"`

	// valid until
	// Format: date-time
	ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"`
}

AttributeAuthorityDescriptor AttributeAuthorityDescriptor represents the SAML AttributeAuthorityDescriptor object.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.7

swagger:model AttributeAuthorityDescriptor

func (*AttributeAuthorityDescriptor) ContextValidate ¶

func (m *AttributeAuthorityDescriptor) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this attribute authority descriptor based on the context it is used

func (*AttributeAuthorityDescriptor) MarshalBinary ¶

func (m *AttributeAuthorityDescriptor) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AttributeAuthorityDescriptor) UnmarshalBinary ¶

func (m *AttributeAuthorityDescriptor) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AttributeAuthorityDescriptor) Validate ¶

func (m *AttributeAuthorityDescriptor) Validate(formats strfmt.Registry) error

Validate validates this attribute authority descriptor

type AttributeConsumingService ¶

type AttributeConsumingService struct {

	// index
	Index int64 `json:"Index,omitempty" yaml:"Index,omitempty"`

	// is default
	IsDefault bool `json:"IsDefault,omitempty" yaml:"IsDefault,omitempty"`

	// requested attributes
	RequestedAttributes []*RequestedAttribute `json:"RequestedAttributes" yaml:"RequestedAttributes"`

	// service descriptions
	ServiceDescriptions []*LocalizedName `json:"ServiceDescriptions" yaml:"ServiceDescriptions"`

	// service names
	ServiceNames []*LocalizedName `json:"ServiceNames" yaml:"ServiceNames"`
}

AttributeConsumingService AttributeConsumingService represents the SAML AttributeConsumingService object.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.4.1

swagger:model AttributeConsumingService

func (*AttributeConsumingService) ContextValidate ¶

func (m *AttributeConsumingService) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this attribute consuming service based on the context it is used

func (*AttributeConsumingService) MarshalBinary ¶

func (m *AttributeConsumingService) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AttributeConsumingService) UnmarshalBinary ¶

func (m *AttributeConsumingService) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AttributeConsumingService) Validate ¶

func (m *AttributeConsumingService) Validate(formats strfmt.Registry) error

Validate validates this attribute consuming service

type AttributeValue ¶

type AttributeValue struct {

	// name ID
	NameID *NameID `json:"NameID,omitempty" yaml:"NameID,omitempty"`

	// type
	Type string `json:"Type,omitempty" yaml:"Type,omitempty"`

	// value
	Value string `json:"Value,omitempty" yaml:"Value,omitempty"`
}

AttributeValue AttributeValue represents the SAML element AttributeValue.

See http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf §2.7.3.1.1

swagger:model AttributeValue

func (*AttributeValue) ContextValidate ¶

func (m *AttributeValue) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this attribute value based on the context it is used

func (*AttributeValue) MarshalBinary ¶

func (m *AttributeValue) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AttributeValue) UnmarshalBinary ¶

func (m *AttributeValue) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AttributeValue) Validate ¶

func (m *AttributeValue) Validate(formats strfmt.Registry) error

Validate validates this attribute value

type Attributes ¶

type Attributes []*Attribute

Attributes attributes

swagger:model Attributes

func (Attributes) ContextValidate ¶

func (m Attributes) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this attributes based on the context it is used

func (Attributes) Validate ¶

func (m Attributes) Validate(formats strfmt.Registry) error

Validate validates this attributes

type AuditConsentKind ¶

type AuditConsentKind string

AuditConsentKind audit consent kind

swagger:model AuditConsentKind

func (AuditConsentKind) ContextValidate ¶

func (m AuditConsentKind) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this audit consent kind based on context it is used

func (AuditConsentKind) Validate ¶

func (m AuditConsentKind) Validate(formats strfmt.Registry) error

Validate validates this audit consent kind

type AuditEvent ¶

type AuditEvent struct {

	// Name of an action that was performed for a given event subject.
	// Example: created
	// Enum: [authenticated authorized unauthorized created updated deleted generated requested confirmed accepted rejected revoked notified issued denied granted attempted failed succeeded sent not_sent executed]
	Action string `json:"action,omitempty" yaml:"action,omitempty"`

	// Additional audit event context.
	Context map[string]string `json:"context,omitempty" yaml:"context,omitempty"`

	// Event ID - unique audit event identifier.
	EventID string `json:"event_id,omitempty" yaml:"event_id,omitempty"`

	// Resource or entity that is a subject of a given audit event.
	// Example: client
	// Enum: [request gateway_request gateway_policy policy client credential login post_authn consent client_consents customer_consents authorization_code access_token saml_assertion scopes otp user selfuser schema pool password bruteforce dcr script role task jit tokens service server]
	EventSubject string `json:"event_subject,omitempty" yaml:"event_subject,omitempty"`

	// metadata
	Metadata *AuditEventMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// payload
	Payload *AuditEventPayloads `json:"payload,omitempty" yaml:"payload,omitempty"`

	// Server ID.
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// Tenant ID.
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// Time when the event took place.
	// Format: date-time
	Timestamp strfmt.DateTime `json:"timestamp,omitempty" yaml:"timestamp,omitempty"`
}

AuditEvent audit event

swagger:model AuditEvent

func (*AuditEvent) ContextValidate ¶

func (m *AuditEvent) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this audit event based on the context it is used

func (*AuditEvent) MarshalBinary ¶

func (m *AuditEvent) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AuditEvent) UnmarshalBinary ¶

func (m *AuditEvent) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AuditEvent) Validate ¶

func (m *AuditEvent) Validate(formats strfmt.Registry) error

Validate validates this audit event

type AuditEventMetadata ¶

type AuditEventMetadata struct {

	// Access request actor claims.
	//
	// It's only populated if the token has been issued in token exchange delegation flow.
	ActorClaims map[string]interface{} `json:"actor_claims,omitempty" yaml:"actor_claims,omitempty"`

	// Access request client ID related to an audit event.
	//
	// May be empty when the access is incorrect or missing.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// ID of the Identity Pool
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// Audit event IP address.
	//
	// It's first not empty value from: X-Forwaded-For, X-Real-IP or network socket IP address
	IP string `json:"ip,omitempty" yaml:"ip,omitempty"`

	// Access request may act claims.
	//
	// It's only populated if the token has been issued token with may_act claim.
	MayActClaims map[string]interface{} `json:"may_act_claims,omitempty" yaml:"may_act_claims,omitempty"`

	// Session id
	//
	// Correlation ID in a login process. Returns events related to a particular login process.
	// It's empty for audit events that have been created outside login process.
	SessionID string `json:"session_id,omitempty" yaml:"session_id,omitempty"`

	// Access request subject ID related to a given audit event.
	//
	// May be empty when the access is incorrect or missing.
	Subject string `json:"subject,omitempty" yaml:"subject,omitempty"`

	// Token signature
	//
	// Signature of a token that was used to perform an action that has published an audit event.
	TokenSignature string `json:"token_signature,omitempty" yaml:"token_signature,omitempty"`

	// Trace ID
	TraceID string `json:"trace_id,omitempty" yaml:"trace_id,omitempty"`

	// User-agent that describes a device name that generated the audit event.
	UserAgent string `json:"user_agent,omitempty" yaml:"user_agent,omitempty"`
}

AuditEventMetadata audit event metadata

swagger:model AuditEventMetadata

func (*AuditEventMetadata) ContextValidate ¶

func (m *AuditEventMetadata) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this audit event metadata based on context it is used

func (*AuditEventMetadata) MarshalBinary ¶

func (m *AuditEventMetadata) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AuditEventMetadata) UnmarshalBinary ¶

func (m *AuditEventMetadata) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AuditEventMetadata) Validate ¶

func (m *AuditEventMetadata) Validate(formats strfmt.Registry) error

Validate validates this audit event metadata

type AuditEventPayloads ¶

type AuditEventPayloads struct {

	// access token denied
	AccessTokenDenied *AccessRequestDataWithError `json:"access_token_denied,omitempty" yaml:"access_token_denied,omitempty"`

	// access token issued
	AccessTokenIssued *AccessRequestData `json:"access_token_issued,omitempty" yaml:"access_token_issued,omitempty"`

	// authorization code denied
	AuthorizationCodeDenied *AccessRequestDataWithError `json:"authorization_code_denied,omitempty" yaml:"authorization_code_denied,omitempty"`

	// authorization code issued
	AuthorizationCodeIssued *AccessRequestData `json:"authorization_code_issued,omitempty" yaml:"authorization_code_issued,omitempty"`

	// bruteforce deleted
	BruteforceDeleted *BruteForcePayload `json:"bruteforce_deleted,omitempty" yaml:"bruteforce_deleted,omitempty"`

	// bruteforce updated
	BruteforceUpdated *BruteForcePayload `json:"bruteforce_updated,omitempty" yaml:"bruteforce_updated,omitempty"`

	// client consents revoked
	ClientConsentsRevoked *ClientConsentsAuditEventPayload `json:"client_consents_revoked,omitempty" yaml:"client_consents_revoked,omitempty"`

	// client created
	ClientCreated *ClientAuditPayload `json:"client_created,omitempty" yaml:"client_created,omitempty"`

	// client deleted
	ClientDeleted *ClientAuditPayload `json:"client_deleted,omitempty" yaml:"client_deleted,omitempty"`

	// client updated
	ClientUpdated *ClientAuditPayload `json:"client_updated,omitempty" yaml:"client_updated,omitempty"`

	// consent accepted
	ConsentAccepted *ConsentAuditEventPayload `json:"consent_accepted,omitempty" yaml:"consent_accepted,omitempty"`

	// consent created
	ConsentCreated *ConsentAuditEventPayload `json:"consent_created,omitempty" yaml:"consent_created,omitempty"`

	// consent notified
	ConsentNotified *ConsentNotifiedPayload `json:"consent_notified,omitempty" yaml:"consent_notified,omitempty"`

	// consent rejected
	ConsentRejected *ConsentAuditEventPayload `json:"consent_rejected,omitempty" yaml:"consent_rejected,omitempty"`

	// consent revoked
	ConsentRevoked *ConsentAuditEventPayload `json:"consent_revoked,omitempty" yaml:"consent_revoked,omitempty"`

	// consent updated
	ConsentUpdated *ConsentAuditEventPayload `json:"consent_updated,omitempty" yaml:"consent_updated,omitempty"`

	// credential created
	CredentialCreated *CredentialPayload `json:"credential_created,omitempty" yaml:"credential_created,omitempty"`

	// credential updated
	CredentialUpdated *CredentialPayload `json:"credential_updated,omitempty" yaml:"credential_updated,omitempty"`

	// customer consents revoked
	CustomerConsentsRevoked *CustomerConsentsAuditEventPayload `json:"customer_consents_revoked,omitempty" yaml:"customer_consents_revoked,omitempty"`

	// dcr created
	DcrCreated *DCRCreatedEventPayload `json:"dcr_created,omitempty" yaml:"dcr_created,omitempty"`

	// dcr rejected
	DcrRejected *DCRRejectedEventPayload `json:"dcr_rejected,omitempty" yaml:"dcr_rejected,omitempty"`

	// gateway policy authorized
	GatewayPolicyAuthorized *RequestValidatedPayload `json:"gateway_policy_authorized,omitempty" yaml:"gateway_policy_authorized,omitempty"`

	// gateway policy unauthorized
	GatewayPolicyUnauthorized *RequestValidatedPayload `json:"gateway_policy_unauthorized,omitempty" yaml:"gateway_policy_unauthorized,omitempty"`

	// gateway request authorized
	GatewayRequestAuthorized *RequestValidatedPayload `json:"gateway_request_authorized,omitempty" yaml:"gateway_request_authorized,omitempty"`

	// gateway request unauthorized
	GatewayRequestUnauthorized *RequestValidatedPayload `json:"gateway_request_unauthorized,omitempty" yaml:"gateway_request_unauthorized,omitempty"`

	// jit created
	JitCreated *JITCreatedPayload `json:"jit_created,omitempty" yaml:"jit_created,omitempty"`

	// jit failed
	JitFailed *JITFailedPayload `json:"jit_failed,omitempty" yaml:"jit_failed,omitempty"`

	// jit updated
	JitUpdated *JITUpdatedPayload `json:"jit_updated,omitempty" yaml:"jit_updated,omitempty"`

	// login accepted
	LoginAccepted *LoginPayload `json:"login_accepted,omitempty" yaml:"login_accepted,omitempty"`

	// login attempted
	LoginAttempted *LoginPayload `json:"login_attempted,omitempty" yaml:"login_attempted,omitempty"`

	// login failed
	LoginFailed *LoginFailedPayload `json:"login_failed,omitempty" yaml:"login_failed,omitempty"`

	// otp accepted
	OtpAccepted *OTPPayload `json:"otp_accepted,omitempty" yaml:"otp_accepted,omitempty"`

	// otp not sent
	OtpNotSent *OTPPayload `json:"otp_not_sent,omitempty" yaml:"otp_not_sent,omitempty"`

	// otp rejected
	OtpRejected *OTPPayload `json:"otp_rejected,omitempty" yaml:"otp_rejected,omitempty"`

	// otp requested
	OtpRequested *OTPPayload `json:"otp_requested,omitempty" yaml:"otp_requested,omitempty"`

	// otp sent
	OtpSent *OTPPayload `json:"otp_sent,omitempty" yaml:"otp_sent,omitempty"`

	// password accepted
	PasswordAccepted *PasswordPayload `json:"password_accepted,omitempty" yaml:"password_accepted,omitempty"`

	// password confirmed
	PasswordConfirmed *PasswordPayload `json:"password_confirmed,omitempty" yaml:"password_confirmed,omitempty"`

	// password rejected
	PasswordRejected *PasswordPayload `json:"password_rejected,omitempty" yaml:"password_rejected,omitempty"`

	// password requested
	PasswordRequested *PasswordPayload `json:"password_requested,omitempty" yaml:"password_requested,omitempty"`

	// password updated
	PasswordUpdated *PasswordPayload `json:"password_updated,omitempty" yaml:"password_updated,omitempty"`

	// policy authorized
	PolicyAuthorized *PolicyEvaluatedPayload `json:"policy_authorized,omitempty" yaml:"policy_authorized,omitempty"`

	// policy unauthorized
	PolicyUnauthorized *PolicyEvaluatedPayload `json:"policy_unauthorized,omitempty" yaml:"policy_unauthorized,omitempty"`

	// pool created
	PoolCreated *PoolAuditPayload `json:"pool_created,omitempty" yaml:"pool_created,omitempty"`

	// pool deleted
	PoolDeleted *PoolAuditPayload `json:"pool_deleted,omitempty" yaml:"pool_deleted,omitempty"`

	// pool updated
	PoolUpdated *PoolAuditPayload `json:"pool_updated,omitempty" yaml:"pool_updated,omitempty"`

	// role granted
	RoleGranted *RoleGrantAuditPayload `json:"role_granted,omitempty" yaml:"role_granted,omitempty"`

	// role revoked
	RoleRevoked *RoleGrantAuditPayload `json:"role_revoked,omitempty" yaml:"role_revoked,omitempty"`

	// saml assertion denied
	SamlAssertionDenied *AccessRequestDataWithError `json:"saml_assertion_denied,omitempty" yaml:"saml_assertion_denied,omitempty"`

	// saml assertion issued
	SamlAssertionIssued *AccessRequestData `json:"saml_assertion_issued,omitempty" yaml:"saml_assertion_issued,omitempty"`

	// schema created
	SchemaCreated *SchemaAuditPayload `json:"schema_created,omitempty" yaml:"schema_created,omitempty"`

	// schema deleted
	SchemaDeleted *SchemaAuditPayload `json:"schema_deleted,omitempty" yaml:"schema_deleted,omitempty"`

	// schema updated
	SchemaUpdated *SchemaAuditPayload `json:"schema_updated,omitempty" yaml:"schema_updated,omitempty"`

	// scopes granted
	ScopesGranted *ScopesGrantedPayload `json:"scopes_granted,omitempty" yaml:"scopes_granted,omitempty"`

	// script executed
	ScriptExecuted *ScriptExecutionAuditPayload `json:"script_executed,omitempty" yaml:"script_executed,omitempty"`

	// server created
	ServerCreated *ServerAuditPayload `json:"server_created,omitempty" yaml:"server_created,omitempty"`

	// server deleted
	ServerDeleted *ServerAuditPayload `json:"server_deleted,omitempty" yaml:"server_deleted,omitempty"`

	// server updated
	ServerUpdated *ServerAuditPayload `json:"server_updated,omitempty" yaml:"server_updated,omitempty"`

	// service created
	ServiceCreated *ServiceAuditPayload `json:"service_created,omitempty" yaml:"service_created,omitempty"`

	// service deleted
	ServiceDeleted *ServiceAuditPayload `json:"service_deleted,omitempty" yaml:"service_deleted,omitempty"`

	// service updated
	ServiceUpdated *ServiceAuditPayload `json:"service_updated,omitempty" yaml:"service_updated,omitempty"`

	// task failed
	TaskFailed *TaskAuditPayload `json:"task_failed,omitempty" yaml:"task_failed,omitempty"`

	// task succeeded
	TaskSucceeded *TaskAuditPayload `json:"task_succeeded,omitempty" yaml:"task_succeeded,omitempty"`

	// tokens revoked
	TokensRevoked *TokensRevokedPayload `json:"tokens_revoked,omitempty" yaml:"tokens_revoked,omitempty"`

	// user authenticated
	UserAuthenticated *UserAuthenticatedPayload `json:"user_authenticated,omitempty" yaml:"user_authenticated,omitempty"`

	// user created
	UserCreated *UserPayload `json:"user_created,omitempty" yaml:"user_created,omitempty"`

	// user deleted
	UserDeleted *UserPayload `json:"user_deleted,omitempty" yaml:"user_deleted,omitempty"`

	// user updated
	UserUpdated *UserPayload `json:"user_updated,omitempty" yaml:"user_updated,omitempty"`
}

AuditEventPayloads audit event payloads

swagger:model AuditEventPayloads

func (*AuditEventPayloads) ContextValidate ¶

func (m *AuditEventPayloads) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this audit event payloads based on the context it is used

func (*AuditEventPayloads) MarshalBinary ¶

func (m *AuditEventPayloads) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AuditEventPayloads) UnmarshalBinary ¶

func (m *AuditEventPayloads) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AuditEventPayloads) Validate ¶

func (m *AuditEventPayloads) Validate(formats strfmt.Registry) error

Validate validates this audit event payloads

type AuditEvents ¶

type AuditEvents struct {

	// audit events
	AuditEvents []*AuditEvent `json:"audit_events" yaml:"audit_events"`
}

AuditEvents audit events

swagger:model AuditEvents

func (*AuditEvents) ContextValidate ¶

func (m *AuditEvents) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this audit events based on the context it is used

func (*AuditEvents) MarshalBinary ¶

func (m *AuditEvents) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AuditEvents) UnmarshalBinary ¶

func (m *AuditEvents) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AuditEvents) Validate ¶

func (m *AuditEvents) Validate(formats strfmt.Registry) error

Validate validates this audit events

type Auth0Credentials ¶

type Auth0Credentials struct {

	// OAuth client application secret
	ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"`
}

Auth0Credentials Auth0 IDP specific credentials

swagger:model Auth0Credentials

func (*Auth0Credentials) ContextValidate ¶

func (m *Auth0Credentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this auth0 credentials based on context it is used

func (*Auth0Credentials) MarshalBinary ¶

func (m *Auth0Credentials) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Auth0Credentials) UnmarshalBinary ¶

func (m *Auth0Credentials) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Auth0Credentials) Validate ¶

func (m *Auth0Credentials) Validate(formats strfmt.Registry) error

Validate validates this auth0 credentials

type Auth0IDP ¶

type Auth0IDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// credentials
	Credentials *Auth0Credentials `json:"credentials,omitempty" yaml:"credentials,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// settings
	Settings *Auth0Settings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

Auth0IDP auth0 ID p

swagger:model Auth0IDP

func (*Auth0IDP) ContextValidate ¶

func (m *Auth0IDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this auth0 ID p based on the context it is used

func (*Auth0IDP) MarshalBinary ¶

func (m *Auth0IDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Auth0IDP) UnmarshalBinary ¶

func (m *Auth0IDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Auth0IDP) Validate ¶

func (m *Auth0IDP) Validate(formats strfmt.Registry) error

Validate validates this auth0 ID p

type Auth0Settings ¶

type Auth0Settings struct {

	// OAuth client application identifier
	// Example: client
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// String represented domain of the Auth0 for your organization
	// Example: dev-318ay013.us.auth0.com
	Domain string `json:"domain,omitempty" yaml:"domain,omitempty"`

	// If enabled, users' data is collected by calling the `userinfo` endpoint.
	GetUserInfo bool `json:"get_user_info,omitempty" yaml:"get_user_info,omitempty"`

	// An array of additional scopes your client requests
	// Example: ["email","profile","openid"]
	Scopes []string `json:"scopes" yaml:"scopes"`

	// Whether to send the identifier as a `login_hint` parameter to the IDP
	SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"`
}

Auth0Settings Auth0 IDP specific settings

swagger:model Auth0Settings

func (*Auth0Settings) ContextValidate ¶

func (m *Auth0Settings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this auth0 settings based on context it is used

func (*Auth0Settings) MarshalBinary ¶

func (m *Auth0Settings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Auth0Settings) UnmarshalBinary ¶

func (m *Auth0Settings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Auth0Settings) Validate ¶

func (m *Auth0Settings) Validate(formats strfmt.Registry) error

Validate validates this auth0 settings

type AuthenticationContext ¶

type AuthenticationContext map[string]interface{}

AuthenticationContext authentication context

swagger:model AuthenticationContext

func (AuthenticationContext) ContextValidate ¶

func (m AuthenticationContext) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this authentication context based on context it is used

func (AuthenticationContext) Validate ¶

func (m AuthenticationContext) Validate(formats strfmt.Registry) error

Validate validates this authentication context

type AuthenticationContextSettings ¶

type AuthenticationContextSettings struct {

	// attributes
	Attributes []*Attribute `json:"attributes" yaml:"attributes"`
}

AuthenticationContextSettings authentication context settings

swagger:model AuthenticationContextSettings

func (*AuthenticationContextSettings) ContextValidate ¶

func (m *AuthenticationContextSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this authentication context settings based on the context it is used

func (*AuthenticationContextSettings) MarshalBinary ¶

func (m *AuthenticationContextSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AuthenticationContextSettings) UnmarshalBinary ¶

func (m *AuthenticationContextSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AuthenticationContextSettings) Validate ¶

func (m *AuthenticationContextSettings) Validate(formats strfmt.Registry) error

Validate validates this authentication context settings

type AuthenticationMechanisms ¶

type AuthenticationMechanisms []string

AuthenticationMechanisms AuthenticationMechanisms authentication mechanisms

swagger:model AuthenticationMechanisms

func (AuthenticationMechanisms) ContextValidate ¶

func (m AuthenticationMechanisms) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this authentication mechanisms based on context it is used

func (AuthenticationMechanisms) Validate ¶

func (m AuthenticationMechanisms) Validate(formats strfmt.Registry) error

Validate validates this authentication mechanisms

type AuthnAuthorityDescriptor ¶

type AuthnAuthorityDescriptor struct {

	// assertion ID request services
	AssertionIDRequestServices []*Endpoint `json:"AssertionIDRequestServices" yaml:"AssertionIDRequestServices"`

	// authn query services
	AuthnQueryServices []*Endpoint `json:"AuthnQueryServices" yaml:"AuthnQueryServices"`

	// cache duration
	CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"`

	// contact people
	ContactPeople []*ContactPerson `json:"ContactPeople" yaml:"ContactPeople"`

	// error URL
	ErrorURL string `json:"ErrorURL,omitempty" yaml:"ErrorURL,omitempty"`

	// ID
	ID string `json:"ID,omitempty" yaml:"ID,omitempty"`

	// key descriptors
	KeyDescriptors []*KeyDescriptor `json:"KeyDescriptors" yaml:"KeyDescriptors"`

	// name ID formats
	NameIDFormats []NameIDFormat `json:"NameIDFormats" yaml:"NameIDFormats"`

	// organization
	Organization *Organization `json:"Organization,omitempty" yaml:"Organization,omitempty"`

	// protocol support enumeration
	ProtocolSupportEnumeration string `json:"ProtocolSupportEnumeration,omitempty" yaml:"ProtocolSupportEnumeration,omitempty"`

	// signature
	Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"`

	// valid until
	// Format: date-time
	ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"`
}

AuthnAuthorityDescriptor AuthnAuthorityDescriptor represents the SAML AuthnAuthorityDescriptor object.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.5

swagger:model AuthnAuthorityDescriptor

func (*AuthnAuthorityDescriptor) ContextValidate ¶

func (m *AuthnAuthorityDescriptor) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this authn authority descriptor based on the context it is used

func (*AuthnAuthorityDescriptor) MarshalBinary ¶

func (m *AuthnAuthorityDescriptor) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AuthnAuthorityDescriptor) UnmarshalBinary ¶

func (m *AuthnAuthorityDescriptor) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AuthnAuthorityDescriptor) Validate ¶

func (m *AuthnAuthorityDescriptor) Validate(formats strfmt.Registry) error

Validate validates this authn authority descriptor

type AuthorizationDetail ¶

type AuthorizationDetail struct {

	// An authorization server (workspace) identifier holding the client application.
	// Example: default
	// Required: true
	AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"`

	// Description
	// Example: Authorization detail for payment initiation
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Authorization detail unique identifier
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// General purpose metadata
	Metadata map[string]interface{} `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// Display name
	// Example: Payment Initiation
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// schema
	Schema *SupportedJSONSchema `json:"schema,omitempty" yaml:"schema,omitempty"`

	// ID of the tenant
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// type
	// Required: true
	Type *AuthorizationDetailType `json:"type" yaml:"type"`
}

AuthorizationDetail Authorization detail

swagger:model AuthorizationDetail

func (*AuthorizationDetail) ContextValidate ¶

func (m *AuthorizationDetail) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this authorization detail based on the context it is used

func (*AuthorizationDetail) MarshalBinary ¶

func (m *AuthorizationDetail) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AuthorizationDetail) UnmarshalBinary ¶

func (m *AuthorizationDetail) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AuthorizationDetail) Validate ¶

func (m *AuthorizationDetail) Validate(formats strfmt.Registry) error

Validate validates this authorization detail

type AuthorizationDetailType ¶

type AuthorizationDetailType string

AuthorizationDetailType authorization detail type

swagger:model AuthorizationDetailType

func (AuthorizationDetailType) ContextValidate ¶

func (m AuthorizationDetailType) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this authorization detail type based on context it is used

func (AuthorizationDetailType) Validate ¶

func (m AuthorizationDetailType) Validate(formats strfmt.Registry) error

Validate validates this authorization detail type

type AuthorizationDetailWithService ¶

type AuthorizationDetailWithService struct {

	// An authorization server (workspace) identifier holding the client application.
	// Example: default
	// Required: true
	AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"`

	// Description
	// Example: Authorization detail for payment initiation
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Authorization detail unique identifier
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// General purpose metadata
	Metadata map[string]interface{} `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// Display name
	// Example: Payment Initiation
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// schema
	Schema *SupportedJSONSchema `json:"schema,omitempty" yaml:"schema,omitempty"`

	// service
	Service *Service `json:"service,omitempty" yaml:"service,omitempty"`

	// ID of the tenant
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// type
	// Required: true
	Type *AuthorizationDetailType `json:"type" yaml:"type"`
}

AuthorizationDetailWithService authorization detail with service

swagger:model AuthorizationDetailWithService

func (*AuthorizationDetailWithService) ContextValidate ¶

func (m *AuthorizationDetailWithService) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this authorization detail with service based on the context it is used

func (*AuthorizationDetailWithService) MarshalBinary ¶

func (m *AuthorizationDetailWithService) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AuthorizationDetailWithService) UnmarshalBinary ¶

func (m *AuthorizationDetailWithService) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AuthorizationDetailWithService) Validate ¶

func (m *AuthorizationDetailWithService) Validate(formats strfmt.Registry) error

Validate validates this authorization detail with service

type AuthorizationDetailWithServiceID ¶

type AuthorizationDetailWithServiceID struct {

	// An authorization server (workspace) identifier holding the client application.
	// Example: default
	// Required: true
	AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"`

	// Description
	// Example: Authorization detail for payment initiation
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Authorization detail unique identifier
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// General purpose metadata
	Metadata map[string]interface{} `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// Display name
	// Example: Payment Initiation
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// schema
	Schema *SupportedJSONSchema `json:"schema,omitempty" yaml:"schema,omitempty"`

	// Service id
	// Required: true
	ServiceID string `json:"service_id" yaml:"service_id"`

	// ID of the tenant
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// type
	// Required: true
	Type *AuthorizationDetailType `json:"type" yaml:"type"`
}

AuthorizationDetailWithServiceID authorization detail with service ID

swagger:model AuthorizationDetailWithServiceID

func (*AuthorizationDetailWithServiceID) ContextValidate ¶

func (m *AuthorizationDetailWithServiceID) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this authorization detail with service ID based on the context it is used

func (*AuthorizationDetailWithServiceID) MarshalBinary ¶

func (m *AuthorizationDetailWithServiceID) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AuthorizationDetailWithServiceID) UnmarshalBinary ¶

func (m *AuthorizationDetailWithServiceID) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AuthorizationDetailWithServiceID) Validate ¶

Validate validates this authorization detail with service ID

type AuthorizationDetailsWithServices ¶

type AuthorizationDetailsWithServices struct {

	// list of authorization details
	AuthorizationDetails []*AuthorizationDetailWithService `json:"authorization_details" yaml:"authorization_details"`
}

AuthorizationDetailsWithServices authorization details with services

swagger:model AuthorizationDetailsWithServices

func (*AuthorizationDetailsWithServices) ContextValidate ¶

func (m *AuthorizationDetailsWithServices) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this authorization details with services based on the context it is used

func (*AuthorizationDetailsWithServices) MarshalBinary ¶

func (m *AuthorizationDetailsWithServices) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AuthorizationDetailsWithServices) UnmarshalBinary ¶

func (m *AuthorizationDetailsWithServices) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AuthorizationDetailsWithServices) Validate ¶

Validate validates this authorization details with services

type AutomaticKeyRotation ¶

type AutomaticKeyRotation struct {

	// cron
	// Required: true
	Cron string `json:"cron" yaml:"cron"`

	// enabled
	// Required: true
	Enabled bool `json:"enabled" yaml:"enabled"`

	// scheduled at
	// Read Only: true
	// Format: date-time
	ScheduledAt strfmt.DateTime `json:"scheduled_at,omitempty" yaml:"scheduled_at,omitempty"`

	// starting from
	// Format: date-time
	StartingFrom strfmt.DateTime `json:"starting_from,omitempty" yaml:"starting_from,omitempty"`
}

AutomaticKeyRotation automatic key rotation

swagger:model AutomaticKeyRotation

func (*AutomaticKeyRotation) ContextValidate ¶

func (m *AutomaticKeyRotation) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this automatic key rotation based on the context it is used

func (*AutomaticKeyRotation) MarshalBinary ¶

func (m *AutomaticKeyRotation) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AutomaticKeyRotation) UnmarshalBinary ¶

func (m *AutomaticKeyRotation) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AutomaticKeyRotation) Validate ¶

func (m *AutomaticKeyRotation) Validate(formats strfmt.Registry) error

Validate validates this automatic key rotation

type AvailableEvents ¶

type AvailableEvents struct {

	// The ETag HTTP header is an identifier for a specific version of a resource
	//
	// in:header
	Etag string `json:"etag,omitempty" yaml:"etag,omitempty"`

	// List of the events
	// in:body
	Subjects []*EventSubject `json:"subjects" yaml:"subjects"`
}

AvailableEvents AvailableEvents

swagger:model AvailableEvents

func (*AvailableEvents) ContextValidate ¶

func (m *AvailableEvents) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this available events based on the context it is used

func (*AvailableEvents) MarshalBinary ¶

func (m *AvailableEvents) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AvailableEvents) UnmarshalBinary ¶

func (m *AvailableEvents) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AvailableEvents) Validate ¶

func (m *AvailableEvents) Validate(formats strfmt.Registry) error

Validate validates this available events

type AzureB2CCredentials ¶

type AzureB2CCredentials struct {

	// Application secret from your Microsoft Azure application settings
	ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"`
}

AzureB2CCredentials Azure IDP B2C specific credentials

swagger:model AzureB2CCredentials

func (*AzureB2CCredentials) ContextValidate ¶

func (m *AzureB2CCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this azure b2 c credentials based on context it is used

func (*AzureB2CCredentials) MarshalBinary ¶

func (m *AzureB2CCredentials) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AzureB2CCredentials) UnmarshalBinary ¶

func (m *AzureB2CCredentials) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AzureB2CCredentials) Validate ¶

func (m *AzureB2CCredentials) Validate(formats strfmt.Registry) error

Validate validates this azure b2 c credentials

type AzureB2CIDP ¶

type AzureB2CIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// credentials
	Credentials *AzureB2CCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// settings
	Settings *AzureB2CSettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

AzureB2CIDP azure b2 c ID p

swagger:model AzureB2CIDP

func (*AzureB2CIDP) ContextValidate ¶

func (m *AzureB2CIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this azure b2 c ID p based on the context it is used

func (*AzureB2CIDP) MarshalBinary ¶

func (m *AzureB2CIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AzureB2CIDP) UnmarshalBinary ¶

func (m *AzureB2CIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AzureB2CIDP) Validate ¶

func (m *AzureB2CIDP) Validate(formats strfmt.Registry) error

Validate validates this azure b2 c ID p

type AzureB2CSettings ¶

type AzureB2CSettings struct {

	// Application ID from your Microsoft Azure B2C application settings
	// Example: client
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// Custom domain from your Microsoft Azure application settings when using a custom
	// domain such as with Azure Front Door. This is optional.
	// Example: my.customdomain.com
	CustomDomain string `json:"custom_domain,omitempty" yaml:"custom_domain,omitempty"`

	// If enabled, the groups a user belongs to are collected
	//
	// Groups are collections of users and other principals who share access to resources in
	// Microsoft services or in your app. Microsoft Graph provides APIs that you can use to create
	// and manage different types of groups and group functionality according to your scenario.
	//
	// You can only get groups data if you are entitled to call the Microsoft Graph API.
	// Example: true
	FetchGroups bool `json:"fetch_groups,omitempty" yaml:"fetch_groups,omitempty"`

	// If enabled, users' data is collected from the Microsoft Graph API
	//
	// You can only get user's data if you are entitled to call the Microsoft Graph API.
	GetUser bool `json:"get_user,omitempty" yaml:"get_user,omitempty"`

	// An array of user attributes fetched from the Microsoft Graph API
	GraphUserAttributes []string `json:"graph_user_attributes" yaml:"graph_user_attributes"`

	// String represented group name format used for fetching groups
	//
	// It's value can be either `id` or `name`.
	// Example: id
	GroupNameFormat string `json:"group_name_format,omitempty" yaml:"group_name_format,omitempty"`

	// If enabled, only security groups a user belongs to are collected.
	// Example: true
	OnlySecurityGroups bool `json:"only_security_groups,omitempty" yaml:"only_security_groups,omitempty"`

	// The user flow to be run.
	// Specify the name of a user flow you've created in your Azure AD B2C tenant.
	// Example: b2c_1_sign_in
	Policy string `json:"policy,omitempty" yaml:"policy,omitempty"`

	// An array of additional scopes your client is going to request
	// Example: ["email","profile","openid"]
	Scopes []string `json:"scopes" yaml:"scopes"`

	// Whether to send the identifier as a `login_hint` parameter to the IDP
	SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"`

	// Directory ID from your Microsoft Azure B2C application settings
	// Example: 123-312-123
	Tenant string `json:"tenant,omitempty" yaml:"tenant,omitempty"`
}

AzureB2CSettings Azure AD B2C authentication settings

swagger:model AzureB2CSettings

func (*AzureB2CSettings) ContextValidate ¶

func (m *AzureB2CSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this azure b2 c settings based on context it is used

func (*AzureB2CSettings) MarshalBinary ¶

func (m *AzureB2CSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AzureB2CSettings) UnmarshalBinary ¶

func (m *AzureB2CSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AzureB2CSettings) Validate ¶

func (m *AzureB2CSettings) Validate(formats strfmt.Registry) error

Validate validates this azure b2 c settings

type AzureCredentials ¶

type AzureCredentials struct {

	// Application secret from your Microsoft Azure application settings
	ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"`
}

AzureCredentials Azure IDP specific credentials

swagger:model AzureCredentials

func (*AzureCredentials) ContextValidate ¶

func (m *AzureCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this azure credentials based on context it is used

func (*AzureCredentials) MarshalBinary ¶

func (m *AzureCredentials) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AzureCredentials) UnmarshalBinary ¶

func (m *AzureCredentials) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AzureCredentials) Validate ¶

func (m *AzureCredentials) Validate(formats strfmt.Registry) error

Validate validates this azure credentials

type AzureIDP ¶

type AzureIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// credentials
	Credentials *AzureCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// settings
	Settings *AzureSettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

AzureIDP azure ID p

swagger:model AzureIDP

func (*AzureIDP) ContextValidate ¶

func (m *AzureIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this azure ID p based on the context it is used

func (*AzureIDP) MarshalBinary ¶

func (m *AzureIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AzureIDP) UnmarshalBinary ¶

func (m *AzureIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AzureIDP) Validate ¶

func (m *AzureIDP) Validate(formats strfmt.Registry) error

Validate validates this azure ID p

type AzureMetadata ¶

type AzureMetadata struct {

	// apim id
	ApimID string `json:"apim_id,omitempty" yaml:"apim_id,omitempty"`

	// apim name
	ApimName string `json:"apim_name,omitempty" yaml:"apim_name,omitempty"`
}

AzureMetadata azure metadata

swagger:model AzureMetadata

func (*AzureMetadata) ContextValidate ¶

func (m *AzureMetadata) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this azure metadata based on context it is used

func (*AzureMetadata) MarshalBinary ¶

func (m *AzureMetadata) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AzureMetadata) UnmarshalBinary ¶

func (m *AzureMetadata) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AzureMetadata) Validate ¶

func (m *AzureMetadata) Validate(formats strfmt.Registry) error

Validate validates this azure metadata

type AzureSettings ¶

type AzureSettings struct {

	// Application ID from your Microsoft Azure application settings
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// If enabled, the groups a user belongs to are collected
	//
	// Groups are collections of users and other principals who share access to resources in
	// Microsoft services or in your app. Microsoft Graph provides APIs that you can use to create
	// and manage different types of groups and group functionality according to your scenario.
	//
	// You can only get groups data if you are entitled to call the Microsoft Graph API.
	FetchGroups bool `json:"fetch_groups,omitempty" yaml:"fetch_groups,omitempty"`

	// If enabled, users' data is collected from the Microsoft Graph API
	//
	// You can only get user's data if you are entitled to call the Microsoft Graph API.
	GetUser bool `json:"get_user,omitempty" yaml:"get_user,omitempty"`

	// An array of user attributes fetched from the Microsoft Graph API
	GraphUserAttributes []string `json:"graph_user_attributes" yaml:"graph_user_attributes"`

	// String represented group name format used for fetching groups
	//
	// It's value can be either `id` or `name`.
	GroupNameFormat string `json:"group_name_format,omitempty" yaml:"group_name_format,omitempty"`

	// If enabled, only security groups a user belongs to are collected.
	OnlySecurityGroups bool `json:"only_security_groups,omitempty" yaml:"only_security_groups,omitempty"`

	// An array of additional scopes your client requests
	Scopes []string `json:"scopes" yaml:"scopes"`

	// Whether to send the identifier as a `login_hint` parameter to the IDP
	SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"`

	// Directory ID from your Microsoft Azure application settings
	Tenant string `json:"tenant,omitempty" yaml:"tenant,omitempty"`
}

AzureSettings Azure IDP specific settings

swagger:model AzureSettings

func (*AzureSettings) ContextValidate ¶

func (m *AzureSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this azure settings based on context it is used

func (*AzureSettings) MarshalBinary ¶

func (m *AzureSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*AzureSettings) UnmarshalBinary ¶

func (m *AzureSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*AzureSettings) Validate ¶

func (m *AzureSettings) Validate(formats strfmt.Registry) error

Validate validates this azure settings

type BRConsentPayload ¶

type BRConsentPayload struct {

	// account ids
	AccountIds []string `json:"account_ids" yaml:"account_ids"`

	// Client application identifier.
	// Example: \"cauqo9c9vpbs0aj2b2v0\
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// consent id
	ConsentID string `json:"consent_id,omitempty" yaml:"consent_id,omitempty"`

	// created at
	// Format: date-time
	CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"`

	// idempotency key
	IdempotencyKey string `json:"idempotency_key,omitempty" yaml:"idempotency_key,omitempty"`

	// request hash
	RequestHash string `json:"request_hash,omitempty" yaml:"request_hash,omitempty"`

	// Server / Workspace identifier.
	// Example: \"server\
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// spec
	Spec string `json:"spec,omitempty" yaml:"spec,omitempty"`

	// spec version
	SpecVersion SpecVersion `json:"spec_version,omitempty" yaml:"spec_version,omitempty"`

	// status
	Status string `json:"status,omitempty" yaml:"status,omitempty"`

	// Tenant identifier.
	// Example: \"tenant\
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	Type ConsentType `json:"type,omitempty" yaml:"type,omitempty"`
}

BRConsentPayload b r consent payload

swagger:model BRConsentPayload

func (*BRConsentPayload) ContextValidate ¶

func (m *BRConsentPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this b r consent payload based on the context it is used

func (*BRConsentPayload) MarshalBinary ¶

func (m *BRConsentPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*BRConsentPayload) UnmarshalBinary ¶

func (m *BRConsentPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*BRConsentPayload) Validate ¶

func (m *BRConsentPayload) Validate(formats strfmt.Registry) error

Validate validates this b r consent payload

type BindGroupToServiceRequest ¶

type BindGroupToServiceRequest struct {

	// service id
	ServiceID string `json:"service_id,omitempty" yaml:"service_id,omitempty"`
}

BindGroupToServiceRequest bind group to service request

swagger:model BindGroupToServiceRequest

func (*BindGroupToServiceRequest) ContextValidate ¶

func (m *BindGroupToServiceRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this bind group to service request based on context it is used

func (*BindGroupToServiceRequest) MarshalBinary ¶

func (m *BindGroupToServiceRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*BindGroupToServiceRequest) UnmarshalBinary ¶

func (m *BindGroupToServiceRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*BindGroupToServiceRequest) Validate ¶

func (m *BindGroupToServiceRequest) Validate(formats strfmt.Registry) error

Validate validates this bind group to service request

type BindSystemAPIRequest ¶

type BindSystemAPIRequest struct {

	// api id
	APIID string `json:"api_id,omitempty" yaml:"api_id,omitempty"`

	// policy id
	PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"`

	// policy server id
	PolicyServerID string `json:"policy_server_id,omitempty" yaml:"policy_server_id,omitempty"`
}

BindSystemAPIRequest bind system API request

swagger:model BindSystemAPIRequest

func (*BindSystemAPIRequest) ContextValidate ¶

func (m *BindSystemAPIRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this bind system API request based on context it is used

func (*BindSystemAPIRequest) MarshalBinary ¶

func (m *BindSystemAPIRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*BindSystemAPIRequest) UnmarshalBinary ¶

func (m *BindSystemAPIRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*BindSystemAPIRequest) Validate ¶

func (m *BindSystemAPIRequest) Validate(formats strfmt.Registry) error

Validate validates this bind system API request

type BruteForceLimit ¶

type BruteForceLimit struct {

	// block duration
	// Example: 1m0s
	// Required: true
	// Format: duration
	BlockDuration strfmt.Duration `json:"block_duration" yaml:"block_duration"`

	// Max number of attempts
	// Example: 5
	// Required: true
	MaxAttempts int64 `json:"max_attempts" yaml:"max_attempts"`

	// protected type
	// Required: true
	ProtectedType *ProtectedType `json:"protected_type" yaml:"protected_type"`

	// tenant id
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`
}

BruteForceLimit brute force limit

swagger:model BruteForceLimit

func (*BruteForceLimit) ContextValidate ¶

func (m *BruteForceLimit) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this brute force limit based on the context it is used

func (*BruteForceLimit) MarshalBinary ¶

func (m *BruteForceLimit) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*BruteForceLimit) UnmarshalBinary ¶

func (m *BruteForceLimit) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*BruteForceLimit) Validate ¶

func (m *BruteForceLimit) Validate(formats strfmt.Registry) error

Validate validates this brute force limit

type BruteForceLimits ¶

type BruteForceLimits struct {

	// brute force limits
	BruteForceLimits []*BruteForceLimit `json:"brute_force_limits" yaml:"brute_force_limits"`
}

BruteForceLimits brute force limits

swagger:model BruteForceLimits

func (*BruteForceLimits) ContextValidate ¶

func (m *BruteForceLimits) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this brute force limits based on the context it is used

func (*BruteForceLimits) MarshalBinary ¶

func (m *BruteForceLimits) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*BruteForceLimits) UnmarshalBinary ¶

func (m *BruteForceLimits) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*BruteForceLimits) Validate ¶

func (m *BruteForceLimits) Validate(formats strfmt.Registry) error

Validate validates this brute force limits

type BruteForcePayload ¶

type BruteForcePayload struct {

	// block duration
	// Example: 1m0s
	// Required: true
	// Format: duration
	BlockDuration strfmt.Duration `json:"block_duration" yaml:"block_duration"`

	// Max number of attempts
	// Example: 5
	// Required: true
	MaxAttempts int64 `json:"max_attempts" yaml:"max_attempts"`

	// protected type
	// Required: true
	ProtectedType *ProtectedType `json:"protected_type" yaml:"protected_type"`

	// tenant ID
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`
}

BruteForcePayload BruteForcePayload brute force payload

swagger:model BruteForcePayload

func (*BruteForcePayload) ContextValidate ¶

func (m *BruteForcePayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this brute force payload based on the context it is used

func (*BruteForcePayload) MarshalBinary ¶

func (m *BruteForcePayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*BruteForcePayload) UnmarshalBinary ¶

func (m *BruteForcePayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*BruteForcePayload) Validate ¶

func (m *BruteForcePayload) Validate(formats strfmt.Registry) error

Validate validates this brute force payload

type CDRArrangement ¶

type CDRArrangement struct {

	// List of accounts.
	//
	// It can refer to user's bank accounts that can be accessed by your client application in order to provide consumer
	// services.
	AccountIds []string `json:"account_ids" yaml:"account_ids"`

	// amending arrangement id
	AmendingArrangementID CDRArrangementID `json:"amending_arrangement_id,omitempty" yaml:"amending_arrangement_id,omitempty"`

	// Workspace identifier
	// Example: server
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// cdr arrangement id
	CdrArrangementID CDRArrangementID `json:"cdr_arrangement_id,omitempty" yaml:"cdr_arrangement_id,omitempty"`

	// cdr arrangement metadata
	CdrArrangementMetadata *CDRArrangementMetadata `json:"cdr_arrangement_metadata,omitempty" yaml:"cdr_arrangement_metadata,omitempty"`

	// Client application identifier
	// Example: bugkgm23g9kregtu051g
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// Arrangement creation date
	// Example: 2022-07-01T08:52:27.127932Z
	// Format: date-time
	CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"`

	// customer id
	CustomerID CDRCustomerID `json:"customer_id,omitempty" yaml:"customer_id,omitempty"`

	// Arrangement expiration date
	// Example: 2023-03-01T09:02:27.127932Z
	// Format: date-time
	Expiry strfmt.DateTime `json:"expiry,omitempty" yaml:"expiry,omitempty"`

	// The detailed list of scopes voluntarily granted by the user for the client application to access user data.
	ScopeGrants []*ScopeGrant `json:"scope_grants" yaml:"scope_grants"`

	// The rule on how a user shares their data: reuse with a token or without it, or the user allows one-time access.
	// Example: one_time
	// Enum: [one_time one_time_with_refresh_token reusable]
	SharingType string `json:"sharing_type,omitempty" yaml:"sharing_type,omitempty"`

	// Arrangement version.
	// Currently, the version parameter is not used.
	// Example: v1
	// Enum: [v1]
	SpecVersion string `json:"spec_version,omitempty" yaml:"spec_version,omitempty"`

	// status
	Status ConsentStatus `json:"status,omitempty" yaml:"status,omitempty"`

	// Subject identifies an authenticated user.
	// Depending on the workspace configuration, the value can be hashed.
	// Example: 377eb000a87a471291b5a9869930a2422c670b7b6a06f74143eb74a01ed2fbe1
	Subject string `json:"subject,omitempty" yaml:"subject,omitempty"`

	// Tenant identifier
	// Example: my-company
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// Arrangement last update date
	// Example: 2022-10-01T08:52:27.127932Z
	// Format: date-time
	UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"`
}

CDRArrangement c d r arrangement

swagger:model CDRArrangement

func (*CDRArrangement) ContextValidate ¶

func (m *CDRArrangement) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this c d r arrangement based on the context it is used

func (*CDRArrangement) MarshalBinary ¶

func (m *CDRArrangement) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CDRArrangement) UnmarshalBinary ¶

func (m *CDRArrangement) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CDRArrangement) Validate ¶

func (m *CDRArrangement) Validate(formats strfmt.Registry) error

Validate validates this c d r arrangement

type CDRArrangementID ¶

type CDRArrangementID string

CDRArrangementID c d r arrangement ID

swagger:model CDRArrangementID

func (CDRArrangementID) ContextValidate ¶

func (m CDRArrangementID) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this c d r arrangement ID based on context it is used

func (CDRArrangementID) Validate ¶

func (m CDRArrangementID) Validate(formats strfmt.Registry) error

Validate validates this c d r arrangement ID

type CDRArrangementMetadata ¶

type CDRArrangementMetadata struct {

	// personal details
	PersonalDetails *PersonalDetails `json:"personal_details,omitempty" yaml:"personal_details,omitempty"`

	// revocation channel
	RevocationChannel RevocationChannel `json:"revocation_channel,omitempty" yaml:"revocation_channel,omitempty"`

	// revocation reason
	RevocationReason RevocationReason `json:"revocation_reason,omitempty" yaml:"revocation_reason,omitempty"`
}

CDRArrangementMetadata c d r arrangement metadata

swagger:model CDRArrangementMetadata

func (*CDRArrangementMetadata) ContextValidate ¶

func (m *CDRArrangementMetadata) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this c d r arrangement metadata based on the context it is used

func (*CDRArrangementMetadata) MarshalBinary ¶

func (m *CDRArrangementMetadata) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CDRArrangementMetadata) UnmarshalBinary ¶

func (m *CDRArrangementMetadata) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CDRArrangementMetadata) Validate ¶

func (m *CDRArrangementMetadata) Validate(formats strfmt.Registry) error

Validate validates this c d r arrangement metadata

type CDRConfiguration ¶

type CDRConfiguration struct {

	// Flag to enable / disable ADR validation
	// If enabled, register URL must be provided and point to a existing registry
	AdrValidationEnabled bool `json:"adr_validation_enabled,omitempty" yaml:"adr_validation_enabled,omitempty"`

	// brand id
	BrandID string `json:"brand_id,omitempty" yaml:"brand_id,omitempty"`

	// Do not cache trust anchor data, fetch it from registry every time
	// This is useful for testing purposes when the registry might not be fully up when the test is run
	DontCacheTrustAnchorData bool `json:"dont_cache_trust_anchor_data,omitempty" yaml:"dont_cache_trust_anchor_data,omitempty"`

	// industry
	Industry CDRIndustry `json:"industry,omitempty" yaml:"industry,omitempty"`

	// register api version
	RegisterAPIVersion CDRRegisterAPIVersion `json:"register_api_version,omitempty" yaml:"register_api_version,omitempty"`

	// register url
	RegisterURL CDRRegisterURL `json:"register_url,omitempty" yaml:"register_url,omitempty"`

	// Flag to disable register URL validation
	// If enabled, there will be no error message
	// if data from provided register URL can not be fetched
	// It is highly not recommended to use this flag if it is not required
	SkipRegisterURLValidation bool `json:"skip_register_url_validation,omitempty" yaml:"skip_register_url_validation,omitempty"`
}

CDRConfiguration c d r configuration

swagger:model CDRConfiguration

func (*CDRConfiguration) ContextValidate ¶

func (m *CDRConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this c d r configuration based on the context it is used

func (*CDRConfiguration) MarshalBinary ¶

func (m *CDRConfiguration) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CDRConfiguration) UnmarshalBinary ¶

func (m *CDRConfiguration) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CDRConfiguration) Validate ¶

func (m *CDRConfiguration) Validate(formats strfmt.Registry) error

Validate validates this c d r configuration

type CDRCustomerID ¶

type CDRCustomerID string

CDRCustomerID c d r customer ID

swagger:model CDRCustomerID

func (CDRCustomerID) ContextValidate ¶

func (m CDRCustomerID) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this c d r customer ID based on context it is used

func (CDRCustomerID) Validate ¶

func (m CDRCustomerID) Validate(formats strfmt.Registry) error

Validate validates this c d r customer ID

type CDRIndustry ¶

type CDRIndustry string

CDRIndustry c d r industry

swagger:model CDRIndustry

func (CDRIndustry) ContextValidate ¶

func (m CDRIndustry) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this c d r industry based on context it is used

func (CDRIndustry) Validate ¶

func (m CDRIndustry) Validate(formats strfmt.Registry) error

Validate validates this c d r industry

type CDRRegisterAPIVersion ¶

type CDRRegisterAPIVersion string

CDRRegisterAPIVersion c d r register API version

swagger:model CDRRegisterAPIVersion

func (CDRRegisterAPIVersion) ContextValidate ¶

func (m CDRRegisterAPIVersion) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this c d r register API version based on context it is used

func (CDRRegisterAPIVersion) Validate ¶

func (m CDRRegisterAPIVersion) Validate(formats strfmt.Registry) error

Validate validates this c d r register API version

type CDRRegisterURL ¶

type CDRRegisterURL string

CDRRegisterURL c d r register URL

swagger:model CDRRegisterURL

func (CDRRegisterURL) ContextValidate ¶

func (m CDRRegisterURL) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this c d r register URL based on context it is used

func (CDRRegisterURL) Validate ¶

func (m CDRRegisterURL) Validate(formats strfmt.Registry) error

Validate validates this c d r register URL

type CIBAAuthenticationService ¶

type CIBAAuthenticationService struct {

	// client id
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// external
	External *ExternalCIBAAuthenticationService `json:"external,omitempty" yaml:"external,omitempty"`

	// server id
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

CIBAAuthenticationService c i b a authentication service

swagger:model CIBAAuthenticationService

func (*CIBAAuthenticationService) ContextValidate ¶

func (m *CIBAAuthenticationService) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this c i b a authentication service based on the context it is used

func (*CIBAAuthenticationService) MarshalBinary ¶

func (m *CIBAAuthenticationService) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CIBAAuthenticationService) UnmarshalBinary ¶

func (m *CIBAAuthenticationService) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CIBAAuthenticationService) Validate ¶

func (m *CIBAAuthenticationService) Validate(formats strfmt.Registry) error

Validate validates this c i b a authentication service

type CertificateInfo ¶

type CertificateInfo struct {

	// jwks
	Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"`

	// SAN DNS entries from the certificate.
	SanDNS []string `json:"san_dns" yaml:"san_dns"`

	// SAN emails entries from the certificate.
	SanEmails []string `json:"san_emails" yaml:"san_emails"`

	// SAN IP addresses entry from the certificate.
	SanIps []string `json:"san_ips" yaml:"san_ips"`

	// SAN uniformResourceIdentifier entries from the certificate.
	SanUris []string `json:"san_uris" yaml:"san_uris"`

	// Certificate subject DN
	SubjectDn string `json:"subject_dn,omitempty" yaml:"subject_dn,omitempty"`
}

CertificateInfo certificate info

swagger:model CertificateInfo

func (*CertificateInfo) ContextValidate ¶

func (m *CertificateInfo) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this certificate info based on the context it is used

func (*CertificateInfo) MarshalBinary ¶

func (m *CertificateInfo) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CertificateInfo) UnmarshalBinary ¶

func (m *CertificateInfo) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CertificateInfo) Validate ¶

func (m *CertificateInfo) Validate(formats strfmt.Registry) error

Validate validates this certificate info

type Claim ¶

type Claim struct {

	// authorization server id
	// Example: default
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// unique claim id
	// Example: 1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// DeprecatedMapping use SourceType and SourcePath instead
	// claim mapping - path to attribute in authentication context from where claim value should be picked
	// Example: email
	Mapping string `json:"mapping,omitempty" yaml:"mapping,omitempty"`

	// claim name in outgoing id / access token
	// Example: email
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// included in userinfo/introspect endpoints only
	Opaque bool `json:"opaque,omitempty" yaml:"opaque,omitempty"`

	// saml name
	// Example: email
	SamlName string `json:"saml_name,omitempty" yaml:"saml_name,omitempty"`

	// saml name format
	// Example: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
	SamlNameFormat string `json:"saml_name_format,omitempty" yaml:"saml_name_format,omitempty"`

	// list of scopes - when at least one of listed scopes has been granted to a client, then claim will be added to id / access token.
	// In case of empty array claim is always added.
	// Example: ["email","email_verified"]
	Scopes []string `json:"scopes" yaml:"scopes"`

	// path to the attribute in source type context where claim value should be picked from
	SourcePath string `json:"source_path,omitempty" yaml:"source_path,omitempty"`

	// source type
	SourceType ClaimSourceType `json:"source_type,omitempty" yaml:"source_type,omitempty"`

	// tenant id
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	Type ClaimType `json:"type,omitempty" yaml:"type,omitempty"`
}

Claim claim

swagger:model Claim

func (*Claim) ContextValidate ¶

func (m *Claim) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this claim based on the context it is used

func (*Claim) MarshalBinary ¶

func (m *Claim) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Claim) UnmarshalBinary ¶

func (m *Claim) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Claim) Validate ¶

func (m *Claim) Validate(formats strfmt.Registry) error

Validate validates this claim

type ClaimSourceType ¶

type ClaimSourceType string

ClaimSourceType claim source type

swagger:model ClaimSourceType

func (ClaimSourceType) ContextValidate ¶

func (m ClaimSourceType) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this claim source type based on context it is used

func (ClaimSourceType) Validate ¶

func (m ClaimSourceType) Validate(formats strfmt.Registry) error

Validate validates this claim source type

type ClaimType ¶

type ClaimType string

ClaimType claim type, one of: id_token, access_token, saml_assertion example: id_token

swagger:model ClaimType

func (ClaimType) ContextValidate ¶

func (m ClaimType) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this claim type based on context it is used

func (ClaimType) Validate ¶

func (m ClaimType) Validate(formats strfmt.Registry) error

Validate validates this claim type

type Claims ¶

type Claims struct {

	// list of claims
	Claims []*Claim `json:"claims" yaml:"claims"`
}

Claims claims

swagger:model Claims

func (*Claims) ContextValidate ¶

func (m *Claims) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this claims based on the context it is used

func (*Claims) MarshalBinary ¶

func (m *Claims) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Claims) UnmarshalBinary ¶

func (m *Claims) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Claims) Validate ¶

func (m *Claims) Validate(formats strfmt.Registry) error

Validate validates this claims

type Client ¶

type Client struct {

	// The client application type.
	//
	// Client applications can be either of a `web` or `native` types.
	//
	// Web applications include clients like server web applications or service apps.
	//
	// Native applications include single-page applications (SPAs) and mobile or desktop
	// applications.
	//
	// Apply security measures according to the type of your application.
	// Example: web
	ApplicationType string `json:"application_type,omitempty" yaml:"application_type,omitempty"`

	// An array of dynamically calculated application types that can be used for filtering
	// Example: ["single_page","server_web","mobile_desktop","service","legacy","dcr"]
	// Read Only: true
	ApplicationTypes []string `json:"application_types" yaml:"application_types"`

	// Identity of the intended recipients (the audience).
	//
	// Typically, the audience is a single resource server or a list of resource servers.
	//
	// It is considered a good practice to limit the audience of the token for security purposes.
	Audience []string `json:"audience" yaml:"audience"`

	// Authorization details types
	//
	// Indicates what authorization details types the client can use.
	AuthorizationDetailsTypes []AuthorizationDetailType `json:"authorization_details_types" yaml:"authorization_details_types"`

	// Algorithm used for encrypting authorization responses.
	//
	// If both signing and encryption are requested, the response is first signed, and then encrypted.
	// As a result, a Nested JWT is obtained, as defined in JWT [RFC7519].
	//
	// If omitted, no encryption is applied by default.
	// Example: RSA-OAEP-256
	// Enum: [RSA-OAEP RSA-OAEP-256]
	AuthorizationEncryptedResponseAlg string `json:"authorization_encrypted_response_alg,omitempty" yaml:"authorization_encrypted_response_alg,omitempty"`

	// Algorithm used for encrypting authorization responses.
	//
	// With `authorization_encrypted_response_alg` specified, the default value is `A128CBC-HS256`.
	// When `authorization_encrypted_response_enc` is included, `authorization_encrypted_response_alg`
	// MUST also be provided in a request.
	// Example: A128CBC-HS256
	// Enum: [A256GCM A128CBC-HS256]
	AuthorizationEncryptedResponseEnc string `json:"authorization_encrypted_response_enc,omitempty" yaml:"authorization_encrypted_response_enc,omitempty"`

	// An authorization server (workspace) identifier holding the client application.
	// Example: default
	// Required: true
	AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"`

	// Algorithm used for signing authorization responses.
	//
	// With this parameter specified, the response is signed using JWS and according to the configured algorithm.
	//
	// `none` isn't allowed.
	// Example: RS256
	AuthorizationSignedResponseAlg string `json:"authorization_signed_response_alg,omitempty" yaml:"authorization_signed_response_alg,omitempty"`

	// OPTIONAL. The JWS alg algorithm value used by the client application to sign authentication requests.
	//
	// When omitted, the client application doesn't send signed authentication requests.
	BackchannelAuthenticationRequestSigningAlg string `` /* 127-byte string literal not displayed */

	// REQUIRED for requests when the client application uses CIBA as an authorization grant type, and the token
	// delivery mode is set to `ping` or `push`.
	//
	// This parameter is the endpoint where an OP (OpenID Provider) posts a notification after end-user authentication.
	//
	// Input: an HTTPS URL.
	BackchannelClientNotificationEndpoint string `json:"backchannel_client_notification_endpoint,omitempty" yaml:"backchannel_client_notification_endpoint,omitempty"`

	// REQUIRED for requests when the client application uses CIBA as an authorization grant type.
	//
	// Input: `poll`, `ping`, or `push`.
	BackchannelTokenDeliveryMode string `json:"backchannel_token_delivery_mode,omitempty" yaml:"backchannel_token_delivery_mode,omitempty"`

	// OPTIONAL. A boolean value indicating the `user_code` parameter support by the client application.
	//
	// If omitted, the default value is `false`.
	//
	// This applies only when the `backchannel_user_code_parameter_supported` OP parameter is `true`.
	BackchannelUserCodeParameter bool `json:"backchannel_user_code_parameter,omitempty" yaml:"backchannel_user_code_parameter,omitempty"`

	// OAuth client application identifier
	//
	// If not provided, a random client ID is generated.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// The client identifier time of issue.
	//
	// The value is the number of seconds between 1970-01-01T00:00:00Z (UTC) and the date/time of issue.
	ClientIDIssuedAt int64 `json:"client_id_issued_at,omitempty" yaml:"client_id_issued_at,omitempty"`

	// Human-readable name of a client application.
	// Example: My app
	ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"`

	// OAuth client secret
	//
	// If not provided, a random client secret is generated.
	// Min Length: 32
	ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"`

	// The client secret expiration time.
	//
	// If the client secret does not expire, `client_secret_expires_at` = `0`.
	ClientSecretExpiresAt int64 `json:"client_secret_expires_at,omitempty" yaml:"client_secret_expires_at,omitempty"`

	// Defines whether the client application is active or not.
	//
	// Only clients with the `Active` status can preform authorization, authentication, and PAR requests.
	// Enum: [active inactive]
	ClientStatus string `json:"client_status,omitempty" yaml:"client_status,omitempty"`

	// client type
	// Enum: [oauth2 saml]
	ClientType string `json:"client_type,omitempty" yaml:"client_type,omitempty"`

	// URI of a client application.
	ClientURI string `json:"client_uri,omitempty" yaml:"client_uri,omitempty"`

	// confirmation
	Confirmation *Confirmation `json:"confirmation,omitempty" yaml:"confirmation,omitempty"`

	// Date when the client application was created.
	// Example: 2022-04-07T19:17:31.323187Z
	// Format: date-time
	CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"`

	// Description of the client application.
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Optional developer owner of the client application.
	DeveloperID string `json:"developer_id,omitempty" yaml:"developer_id,omitempty"`

	// developer metadata
	DeveloperMetadata Metadata `json:"developer_metadata,omitempty" yaml:"developer_metadata,omitempty"`

	// Boolean value specifying whether the client always uses DPoP for token requests
	// If true, the authorization server will reject token requests from this client that do not contain the DPoP header.
	DpopBoundAccessTokens bool `json:"dpop_bound_access_tokens,omitempty" yaml:"dpop_bound_access_tokens,omitempty"`

	// dynamically registered
	DynamicallyRegistered bool `json:"dynamically_registered,omitempty" yaml:"dynamically_registered,omitempty"`

	// fdx
	Fdx *FDXMetadata `json:"fdx,omitempty" yaml:"fdx,omitempty"`

	// An array of allowed OAuth client grant types.
	//
	// The `grantTypes` array stores OAuth flows that are allowed for a given client application.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-grant-types/grant-types-overview/) about grant types.
	// Example: ["password","refresh_token","client_credentials","implicit","authorization_code"]
	GrantTypes []string `json:"grant_types" yaml:"grant_types"`

	// An array of hashed rotated client secrets
	HashedRotatedSecrets []string `json:"hashed_rotated_secrets" yaml:"hashed_rotated_secrets"`

	// Hashed client secret
	//
	// Hashing client secrets provides additional security for your secrets storage as it hides
	// plaintext secrets from being viewed both in the UI and the database.
	HashedSecret string `json:"hashed_secret,omitempty" yaml:"hashed_secret,omitempty"`

	// JWE alg algorithm for encrypting the ID token issued to this client application.
	// Enum: [RSA-OAEP RSA-OAEP-256]
	IDTokenEncryptedResponseAlg string `json:"id_token_encrypted_response_alg,omitempty" yaml:"id_token_encrypted_response_alg,omitempty"`

	// JWE enc algorithm for encrypting the ID token issued to this client application.
	// Enum: [A256GCM A128CBC-HS256]
	IDTokenEncryptedResponseEnc string `json:"id_token_encrypted_response_enc,omitempty" yaml:"id_token_encrypted_response_enc,omitempty"`

	// Algorithm for signing ID tokens issued for a client application.
	//
	// The default value depends on authorization server configuration.
	// Example: ES256
	// Enum: [RS256 ES256 PS256]
	IDTokenSignedResponseAlg string `json:"id_token_signed_response_alg,omitempty" yaml:"id_token_signed_response_alg,omitempty"`

	// An introspection endpoint authentication method configured for the client application (read-only).
	//
	// If empty, the `token_endpoint_auth_method` is used.
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	IntrospectionEndpointAuthMethod string `json:"introspection_endpoint_auth_method,omitempty" yaml:"introspection_endpoint_auth_method,omitempty"`

	// jwks
	Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"`

	// A URL of JSON Web Key Set with the public keys used by a client application to authenticate to Cloudentity.
	JwksURI string `json:"jwks_uri,omitempty" yaml:"jwks_uri,omitempty"`

	// Logo URI.
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// metadata
	Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// obbr
	Obbr *OBBRMetadata `json:"obbr,omitempty" yaml:"obbr,omitempty"`

	// External organization identifier. It is a unique string assigned by the CDR Register to identify an Accredited
	// Data Recipient Brand.
	//
	// The value obtained is used as the `aud` claim for message signing, for example, when a JSON Web Token (JWT) is
	// required for authorization, and represents the audience(s) the JWT is intended for.
	// Example: 5647fe90-f6bc-11eb-9a03-0242ac130003
	OrganisationID string `json:"organisation_id,omitempty" yaml:"organisation_id,omitempty"`

	// Policy URL to read about how the profile data is used.
	PolicyURI string `json:"policy_uri,omitempty" yaml:"policy_uri,omitempty"`

	// Array of URLs to which a relying party may request that the user be redirected after a logout has been performed.
	PostLogoutRedirectUris []string `json:"post_logout_redirect_uris" yaml:"post_logout_redirect_uris"`

	// privacy
	Privacy *ClientPrivacy `json:"privacy,omitempty" yaml:"privacy,omitempty"`

	// redirect uris
	RedirectUris RedirectURIs `json:"redirect_uris,omitempty" yaml:"redirect_uris,omitempty"`

	// registration token
	RegistrationToken *RegistrationToken `json:"registration_token,omitempty" yaml:"registration_token,omitempty"`

	// Optional JWE alg algorithm the client is declaring that it may use for encrypting Request Objects
	// Example: RSA-OAEP
	// Enum: [RSA-OAEP RSA-OAEP-256]
	RequestObjectEncryptionAlg string `json:"request_object_encryption_alg,omitempty" yaml:"request_object_encryption_alg,omitempty"`

	// Optional JWE enc algorithm the client is declaring that it may use for encrypting Request Objects
	// When `request_object_encryption_enc` is included, `request_object_encryption_alg` MUST also be provided.
	// Example: A256GCM
	// Enum: [A256GCM A128CBC-HS256]
	RequestObjectEncryptionEnc string `json:"request_object_encryption_enc,omitempty" yaml:"request_object_encryption_enc,omitempty"`

	// Request object signing algorithm for the token endpoint
	//
	// Cloudentity supports signing tokens with the RS256, ES256, and PS256 algorithms. If you do not want
	// to use a signing algorithm, set the value of this parameter to `none`.
	// Example: none
	// Enum: [any none RS256 ES256 PS256]
	RequestObjectSigningAlg string `json:"request_object_signing_alg,omitempty" yaml:"request_object_signing_alg,omitempty"`

	// Array of absolute URIs that points to the Request Object that holds authorization request parameters.
	RequestUris []string `json:"request_uris" yaml:"request_uris"`

	// Boolean parameter indicating whether the only means of initiating an authorization request the client is allowed to use is PAR.
	RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"`

	// response types
	ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"`

	// A revocation endpoint authentication method configured for the client application (read-only).
	// If empty, the `token_endpoint_auth_method` is used.
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	RevocationEndpointAuthMethod string `json:"revocation_endpoint_auth_method,omitempty" yaml:"revocation_endpoint_auth_method,omitempty"`

	// An array of rotated OAuth client secrets
	RotatedSecrets []string `json:"rotated_secrets" yaml:"rotated_secrets"`

	// saml metadata
	SamlMetadata *EntityDescriptor `json:"saml_metadata,omitempty" yaml:"saml_metadata,omitempty"`

	// saml service provider id
	SamlServiceProviderID string `json:"saml_service_provider_id,omitempty" yaml:"saml_service_provider_id,omitempty"`

	// Space-separated list of scopes for compatibility with the OAuth specification.
	// Example: email offline_access openid
	Scope string `json:"scope,omitempty" yaml:"scope,omitempty"`

	// An array of string represented scopes assigned to a client application
	// Example: ["email","offline_access","openid"]
	Scopes []string `json:"scopes" yaml:"scopes"`

	// OPTIONAL. [A URL using the HTTPS scheme](https://openid.net/specs/openid-connect-registration-1_0.html#SectorIdentifierValidation).
	// It must reference a JSON file with the array of `redirect_uri` values.
	//
	// Pass this parameter when you use multiple domains in your `redirect_uris` or need a mechanism to allow changes in
	// domain without affecting consumer consent.
	//
	// [Read more](https://openid.net/specs/openid-connect-core-1_0.html)
	SectorIdentifierURI string `json:"sector_identifier_uri,omitempty" yaml:"sector_identifier_uri,omitempty"`

	// A unique identifier string (e.g., a Universally Unique Identifier
	// (UUID)) assigned by the client developer or software publisher.
	//
	// The `software_id` MUST remain the same across
	// multiple updates or versions of the same software package. The
	// value of this field is not intended to be human-readable and is
	// usually opaque to the client and authorization server.
	SoftwareID string `json:"software_id,omitempty" yaml:"software_id,omitempty"`

	// A digitally signed or MACed JSON Web Token (JWT) [RFC7519] that
	// asserts metadata values about the client software.  In some cases,
	// a software statement is issued directly by the client
	// developer.  In other cases, a software statement is issued by
	// a third-party organization for use by the client developer.
	//
	// In both cases, the trust relationship the authorization server has
	// with the issuer of the software statement is intended to be used
	// as an input to the evaluation of whether the registration request
	// is accepted.
	//
	// A software statement can be presented to an
	// authorization server as part of the client registration request.
	SoftwareStatement string `json:"software_statement,omitempty" yaml:"software_statement,omitempty"`

	// software statement payload
	SoftwareStatementPayload Metadata `json:"software_statement_payload,omitempty" yaml:"software_statement_payload,omitempty"`

	// A version identifier string for the client software identified by
	// `software_id`. The value of the `software_version` MUST be changed
	// with any update of the client software identified by the same
	// `software_id`.
	SoftwareVersion string `json:"software_version,omitempty" yaml:"software_version,omitempty"`

	// Subject identifier type
	//
	// Stores information if the subject identifier is of the `public` or the `pairwise` type.
	//
	// Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer,
	// and are intended to be consumed by client applications. There are two types
	// of subject identifiers: `public` and `pairwise`.
	//
	// For the `public` type, the value of the `sub` (subject) token claim is the same for all clients.
	//
	// For the `pairwise` type, a different `sub` (subject) token claim is provided for each client.
	// Using the `pairwise` subject identifier makes it impossible for client applications to correlate the end-user's
	// activity without their permission.
	// Example: public
	// Enum: [public pairwise]
	SubjectType string `json:"subject_type,omitempty" yaml:"subject_type,omitempty"`

	// Defines whether the client application is a system tenant's application or not.
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// ID of a tenant where the client application is added
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// A string containing the value of an expected dNSName SAN entry in the certificate.
	TLSClientAuthSanDNS string `json:"tls_client_auth_san_dns,omitempty" yaml:"tls_client_auth_san_dns,omitempty"`

	// A string containing the value of an expected rfc822Name SAN entry in the certificate.
	TLSClientAuthSanEmail string `json:"tls_client_auth_san_email,omitempty" yaml:"tls_client_auth_san_email,omitempty"`

	// A string representation of an IP address in either dotted decimal notation (for IPv4) or colon-delimited hexadecimal (for IPv6, as defined in [RFC5952]) that is expected to be present as an iPAddress SAN entry in the certificate.
	TLSClientAuthSanIP string `json:"tls_client_auth_san_ip,omitempty" yaml:"tls_client_auth_san_ip,omitempty"`

	// A string containing the value of an expected uniformResourceIdentifier SAN entry in the certificate.
	TLSClientAuthSanURI string `json:"tls_client_auth_san_uri,omitempty" yaml:"tls_client_auth_san_uri,omitempty"`

	// An [RFC4514] string representation of the expected subject distinguished name of the certificate.
	TLSClientAuthSubjectDn string `json:"tls_client_auth_subject_dn,omitempty" yaml:"tls_client_auth_subject_dn,omitempty"`

	// Boolean value indicating server support for mutual TLS client certificate-bound access tokens. If omitted, the default value is "false".
	TLSClientCertificateBoundAccessTokens bool `json:"tls_client_certificate_bound_access_tokens,omitempty" yaml:"tls_client_certificate_bound_access_tokens,omitempty"`

	// Token endpoint authentication method configured for a client application
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// To learn more, go to the Authorization Basics > Client Authentication section of this guide.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	TokenEndpointAuthMethod string `json:"token_endpoint_auth_method,omitempty" yaml:"token_endpoint_auth_method,omitempty"`

	// Signing algorithm for the token endpoint
	//
	// This field is optional. If empty, a client can use any algorithm supported by the server (see `token_endpoint_auth_signing_alg_values_supported` in the well-known endpoing).
	//
	// If provided, depending on the server configuration, client can use of one: HS256, RS256, ES256, PS256 algorithms.
	//
	// If your token endpoint authentication is set to the `private_key_jwt` method, the
	// `token_endpoint_auth_signing_alg` parameter must be either RS256, ES256, or PS256.
	//
	// If your token endpoint authentication is set to the `client_secret_jwt` method,
	// the `token_endpoint_auth_signing_alg` parameter must be HS256.
	// Example: ES256
	// Enum: [RS256 ES256 PS256 HS256 ]
	TokenEndpointAuthSigningAlg string `json:"token_endpoint_auth_signing_alg,omitempty" yaml:"token_endpoint_auth_signing_alg,omitempty"`

	// token exchange
	TokenExchange *ClientTokenExchangeConfiguration `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"`

	// token ttls
	TokenTtls *TokenTTLs `json:"token_ttls,omitempty" yaml:"token_ttls,omitempty"`

	// Terms of Service URL.
	TosURI string `json:"tos_uri,omitempty" yaml:"tos_uri,omitempty"`

	// Defines whether the client application is trusted or not.
	//
	// For trusted clients, consent pages are skipped during the authorization process.
	Trusted bool `json:"trusted,omitempty" yaml:"trusted,omitempty"`

	// Date when the client application was updated.
	// Example: 2022-05-08T01:11:51.1262916Z
	// Format: date-time
	UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"`

	// If enabled the client application will be able to set its own token TTLs.
	UseCustomTokenTtls bool `json:"use_custom_token_ttls,omitempty" yaml:"use_custom_token_ttls,omitempty"`

	// JWS alg algorithm REQUIRED for signing UserInfo Responses.
	//
	// If specified, the response is a JWT serialized and signed with JWS.
	//
	// If omitted, then by default, UserInfo Response returns the Claims
	// as an UTF-8 encoded JSON object using the application/json content-type.
	// Example: none
	// Enum: [none RS256 ES256]
	UserinfoSignedResponseAlg string `json:"userinfo_signed_response_alg,omitempty" yaml:"userinfo_signed_response_alg,omitempty"`
}

Client Defines a client application and its properties.

swagger:model Client

func (*Client) ContextValidate ¶

func (m *Client) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this client based on the context it is used

func (*Client) MarshalBinary ¶

func (m *Client) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Client) UnmarshalBinary ¶

func (m *Client) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Client) Validate ¶

func (m *Client) Validate(formats strfmt.Registry) error

Validate validates this client

type ClientAdminResponse ¶

type ClientAdminResponse struct {

	// The client application type.
	//
	// Client applications can be either of a `web` or `native` types.
	//
	// Web applications include clients like server web applications or service apps.
	//
	// Native applications include single-page applications (SPAs) and mobile or desktop
	// applications.
	//
	// Apply security measures according to the type of your application.
	// Example: web
	ApplicationType string `json:"application_type,omitempty" yaml:"application_type,omitempty"`

	// An array of dynamically calculated application types that can be used for filtering
	// Example: ["single_page","server_web","mobile_desktop","service","legacy","dcr"]
	// Read Only: true
	ApplicationTypes []string `json:"application_types" yaml:"application_types"`

	// Identity of the intended recipients (the audience).
	//
	// Typically, the audience is a single resource server or a list of resource servers.
	//
	// It is considered a good practice to limit the audience of the token for security purposes.
	Audience []string `json:"audience" yaml:"audience"`

	// Authorization details types
	//
	// Indicates what authorization details types the client can use.
	AuthorizationDetailsTypes []AuthorizationDetailType `json:"authorization_details_types" yaml:"authorization_details_types"`

	// Algorithm used for encrypting authorization responses.
	//
	// If both signing and encryption are requested, the response is first signed, and then encrypted.
	// As a result, a Nested JWT is obtained, as defined in JWT [RFC7519].
	//
	// If omitted, no encryption is applied by default.
	// Example: RSA-OAEP-256
	// Enum: [RSA-OAEP RSA-OAEP-256]
	AuthorizationEncryptedResponseAlg string `json:"authorization_encrypted_response_alg,omitempty" yaml:"authorization_encrypted_response_alg,omitempty"`

	// Algorithm used for encrypting authorization responses.
	//
	// With `authorization_encrypted_response_alg` specified, the default value is `A128CBC-HS256`.
	// When `authorization_encrypted_response_enc` is included, `authorization_encrypted_response_alg`
	// MUST also be provided in a request.
	// Example: A128CBC-HS256
	// Enum: [A256GCM A128CBC-HS256]
	AuthorizationEncryptedResponseEnc string `json:"authorization_encrypted_response_enc,omitempty" yaml:"authorization_encrypted_response_enc,omitempty"`

	// An authorization server (workspace) identifier holding the client application.
	// Example: default
	// Required: true
	AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"`

	// Algorithm used for signing authorization responses.
	//
	// With this parameter specified, the response is signed using JWS and according to the configured algorithm.
	//
	// `none` isn't allowed.
	// Example: RS256
	AuthorizationSignedResponseAlg string `json:"authorization_signed_response_alg,omitempty" yaml:"authorization_signed_response_alg,omitempty"`

	// OPTIONAL. The JWS alg algorithm value used by the client application to sign authentication requests.
	//
	// When omitted, the client application doesn't send signed authentication requests.
	BackchannelAuthenticationRequestSigningAlg string `` /* 127-byte string literal not displayed */

	// REQUIRED for requests when the client application uses CIBA as an authorization grant type, and the token
	// delivery mode is set to `ping` or `push`.
	//
	// This parameter is the endpoint where an OP (OpenID Provider) posts a notification after end-user authentication.
	//
	// Input: an HTTPS URL.
	BackchannelClientNotificationEndpoint string `json:"backchannel_client_notification_endpoint,omitempty" yaml:"backchannel_client_notification_endpoint,omitempty"`

	// REQUIRED for requests when the client application uses CIBA as an authorization grant type.
	//
	// Input: `poll`, `ping`, or `push`.
	BackchannelTokenDeliveryMode string `json:"backchannel_token_delivery_mode,omitempty" yaml:"backchannel_token_delivery_mode,omitempty"`

	// OPTIONAL. A boolean value indicating the `user_code` parameter support by the client application.
	//
	// If omitted, the default value is `false`.
	//
	// This applies only when the `backchannel_user_code_parameter_supported` OP parameter is `true`.
	BackchannelUserCodeParameter bool `json:"backchannel_user_code_parameter,omitempty" yaml:"backchannel_user_code_parameter,omitempty"`

	// OAuth client application identifier
	//
	// If not provided, a random client ID is generated.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// The client identifier time of issue.
	//
	// The value is the number of seconds between 1970-01-01T00:00:00Z (UTC) and the date/time of issue.
	ClientIDIssuedAt int64 `json:"client_id_issued_at,omitempty" yaml:"client_id_issued_at,omitempty"`

	// Human-readable name of a client application.
	// Example: My app
	ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"`

	// OAuth client secret
	//
	// If not provided, a random client secret is generated.
	// Min Length: 32
	ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"`

	// The client secret expiration time.
	//
	// If the client secret does not expire, `client_secret_expires_at` = `0`.
	ClientSecretExpiresAt int64 `json:"client_secret_expires_at,omitempty" yaml:"client_secret_expires_at,omitempty"`

	// Defines whether the client application is active or not.
	//
	// Only clients with the `Active` status can preform authorization, authentication, and PAR requests.
	// Enum: [active inactive]
	ClientStatus string `json:"client_status,omitempty" yaml:"client_status,omitempty"`

	// client type
	// Enum: [oauth2 saml]
	ClientType string `json:"client_type,omitempty" yaml:"client_type,omitempty"`

	// URI of a client application.
	ClientURI string `json:"client_uri,omitempty" yaml:"client_uri,omitempty"`

	// Date when the client application was created.
	// Example: 2022-04-07T19:17:31.323187Z
	// Format: date-time
	CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"`

	// Description of the client application.
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Optional developer owner of the client application.
	DeveloperID string `json:"developer_id,omitempty" yaml:"developer_id,omitempty"`

	// developer metadata
	DeveloperMetadata Metadata `json:"developer_metadata,omitempty" yaml:"developer_metadata,omitempty"`

	// Boolean value specifying whether the client always uses DPoP for token requests
	// If true, the authorization server will reject token requests from this client that do not contain the DPoP header.
	DpopBoundAccessTokens bool `json:"dpop_bound_access_tokens,omitempty" yaml:"dpop_bound_access_tokens,omitempty"`

	// dynamically registered
	DynamicallyRegistered bool `json:"dynamically_registered,omitempty" yaml:"dynamically_registered,omitempty"`

	// fdx
	Fdx *FDXMetadata `json:"fdx,omitempty" yaml:"fdx,omitempty"`

	// An array of allowed OAuth client grant types.
	//
	// The `grantTypes` array stores OAuth flows that are allowed for a given client application.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-grant-types/grant-types-overview/) about grant types.
	// Example: ["password","refresh_token","client_credentials","implicit","authorization_code"]
	GrantTypes []string `json:"grant_types" yaml:"grant_types"`

	// An array of hashed rotated client secrets
	HashedRotatedSecrets []string `json:"hashed_rotated_secrets" yaml:"hashed_rotated_secrets"`

	// Hashed client secret
	//
	// Hashing client secrets provides additional security for your secrets storage as it hides
	// plaintext secrets from being viewed both in the UI and the database.
	HashedSecret string `json:"hashed_secret,omitempty" yaml:"hashed_secret,omitempty"`

	// JWE alg algorithm for encrypting the ID token issued to this client application.
	// Enum: [RSA-OAEP RSA-OAEP-256]
	IDTokenEncryptedResponseAlg string `json:"id_token_encrypted_response_alg,omitempty" yaml:"id_token_encrypted_response_alg,omitempty"`

	// JWE enc algorithm for encrypting the ID token issued to this client application.
	// Enum: [A256GCM A128CBC-HS256]
	IDTokenEncryptedResponseEnc string `json:"id_token_encrypted_response_enc,omitempty" yaml:"id_token_encrypted_response_enc,omitempty"`

	// Algorithm for signing ID tokens issued for a client application.
	//
	// The default value depends on authorization server configuration.
	// Example: ES256
	// Enum: [RS256 ES256 PS256]
	IDTokenSignedResponseAlg string `json:"id_token_signed_response_alg,omitempty" yaml:"id_token_signed_response_alg,omitempty"`

	// An introspection endpoint authentication method configured for the client application (read-only).
	//
	// If empty, the `token_endpoint_auth_method` is used.
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	IntrospectionEndpointAuthMethod string `json:"introspection_endpoint_auth_method,omitempty" yaml:"introspection_endpoint_auth_method,omitempty"`

	// jwks
	Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"`

	// A URL of JSON Web Key Set with the public keys used by a client application to authenticate to Cloudentity.
	JwksURI string `json:"jwks_uri,omitempty" yaml:"jwks_uri,omitempty"`

	// Logo URI.
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// metadata
	Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// obbr
	Obbr *OBBRMetadata `json:"obbr,omitempty" yaml:"obbr,omitempty"`

	// External organization identifier. It is a unique string assigned by the CDR Register to identify an Accredited
	// Data Recipient Brand.
	//
	// The value obtained is used as the `aud` claim for message signing, for example, when a JSON Web Token (JWT) is
	// required for authorization, and represents the audience(s) the JWT is intended for.
	// Example: 5647fe90-f6bc-11eb-9a03-0242ac130003
	OrganisationID string `json:"organisation_id,omitempty" yaml:"organisation_id,omitempty"`

	// Policy URL to read about how the profile data is used.
	PolicyURI string `json:"policy_uri,omitempty" yaml:"policy_uri,omitempty"`

	// Array of URLs to which a relying party may request that the user be redirected after a logout has been performed.
	PostLogoutRedirectUris []string `json:"post_logout_redirect_uris" yaml:"post_logout_redirect_uris"`

	// privacy
	Privacy *ClientPrivacy `json:"privacy,omitempty" yaml:"privacy,omitempty"`

	// redirect uris
	RedirectUris RedirectURIs `json:"redirect_uris,omitempty" yaml:"redirect_uris,omitempty"`

	// Optional JWE alg algorithm the client is declaring that it may use for encrypting Request Objects
	// Example: RSA-OAEP
	// Enum: [RSA-OAEP RSA-OAEP-256]
	RequestObjectEncryptionAlg string `json:"request_object_encryption_alg,omitempty" yaml:"request_object_encryption_alg,omitempty"`

	// Optional JWE enc algorithm the client is declaring that it may use for encrypting Request Objects
	// When `request_object_encryption_enc` is included, `request_object_encryption_alg` MUST also be provided.
	// Example: A256GCM
	// Enum: [A256GCM A128CBC-HS256]
	RequestObjectEncryptionEnc string `json:"request_object_encryption_enc,omitempty" yaml:"request_object_encryption_enc,omitempty"`

	// Request object signing algorithm for the token endpoint
	//
	// Cloudentity supports signing tokens with the RS256, ES256, and PS256 algorithms. If you do not want
	// to use a signing algorithm, set the value of this parameter to `none`.
	// Example: none
	// Enum: [any none RS256 ES256 PS256]
	RequestObjectSigningAlg string `json:"request_object_signing_alg,omitempty" yaml:"request_object_signing_alg,omitempty"`

	// Array of absolute URIs that points to the Request Object that holds authorization request parameters.
	RequestUris []string `json:"request_uris" yaml:"request_uris"`

	// Boolean parameter indicating whether the only means of initiating an authorization request the client is allowed to use is PAR.
	RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"`

	// response types
	ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"`

	// A revocation endpoint authentication method configured for the client application (read-only).
	// If empty, the `token_endpoint_auth_method` is used.
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	RevocationEndpointAuthMethod string `json:"revocation_endpoint_auth_method,omitempty" yaml:"revocation_endpoint_auth_method,omitempty"`

	// An array of rotated OAuth client secrets
	RotatedSecrets []string `json:"rotated_secrets" yaml:"rotated_secrets"`

	// saml metadata
	SamlMetadata *EntityDescriptor `json:"saml_metadata,omitempty" yaml:"saml_metadata,omitempty"`

	// saml service provider id
	SamlServiceProviderID string `json:"saml_service_provider_id,omitempty" yaml:"saml_service_provider_id,omitempty"`

	// Space-separated list of scopes for compatibility with the OAuth specification.
	// Example: email offline_access openid
	Scope string `json:"scope,omitempty" yaml:"scope,omitempty"`

	// An array of string represented scopes assigned to a client application
	// Example: ["email","offline_access","openid"]
	Scopes []string `json:"scopes" yaml:"scopes"`

	// OPTIONAL. [A URL using the HTTPS scheme](https://openid.net/specs/openid-connect-registration-1_0.html#SectorIdentifierValidation).
	// It must reference a JSON file with the array of `redirect_uri` values.
	//
	// Pass this parameter when you use multiple domains in your `redirect_uris` or need a mechanism to allow changes in
	// domain without affecting consumer consent.
	//
	// [Read more](https://openid.net/specs/openid-connect-core-1_0.html)
	SectorIdentifierURI string `json:"sector_identifier_uri,omitempty" yaml:"sector_identifier_uri,omitempty"`

	// server issuer url
	ServerIssuerURL string `json:"server_issuer_url,omitempty" yaml:"server_issuer_url,omitempty"`

	// server mtls issuer url
	ServerMtlsIssuerURL string `json:"server_mtls_issuer_url,omitempty" yaml:"server_mtls_issuer_url,omitempty"`

	// A unique identifier string (e.g., a Universally Unique Identifier
	// (UUID)) assigned by the client developer or software publisher.
	//
	// The `software_id` MUST remain the same across
	// multiple updates or versions of the same software package. The
	// value of this field is not intended to be human-readable and is
	// usually opaque to the client and authorization server.
	SoftwareID string `json:"software_id,omitempty" yaml:"software_id,omitempty"`

	// A digitally signed or MACed JSON Web Token (JWT) [RFC7519] that
	// asserts metadata values about the client software.  In some cases,
	// a software statement is issued directly by the client
	// developer.  In other cases, a software statement is issued by
	// a third-party organization for use by the client developer.
	//
	// In both cases, the trust relationship the authorization server has
	// with the issuer of the software statement is intended to be used
	// as an input to the evaluation of whether the registration request
	// is accepted.
	//
	// A software statement can be presented to an
	// authorization server as part of the client registration request.
	SoftwareStatement string `json:"software_statement,omitempty" yaml:"software_statement,omitempty"`

	// software statement payload
	SoftwareStatementPayload Metadata `json:"software_statement_payload,omitempty" yaml:"software_statement_payload,omitempty"`

	// A version identifier string for the client software identified by
	// `software_id`. The value of the `software_version` MUST be changed
	// with any update of the client software identified by the same
	// `software_id`.
	SoftwareVersion string `json:"software_version,omitempty" yaml:"software_version,omitempty"`

	// Subject identifier type
	//
	// Stores information if the subject identifier is of the `public` or the `pairwise` type.
	//
	// Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer,
	// and are intended to be consumed by client applications. There are two types
	// of subject identifiers: `public` and `pairwise`.
	//
	// For the `public` type, the value of the `sub` (subject) token claim is the same for all clients.
	//
	// For the `pairwise` type, a different `sub` (subject) token claim is provided for each client.
	// Using the `pairwise` subject identifier makes it impossible for client applications to correlate the end-user's
	// activity without their permission.
	// Example: public
	// Enum: [public pairwise]
	SubjectType string `json:"subject_type,omitempty" yaml:"subject_type,omitempty"`

	// Defines whether the client application is a system tenant's application or not.
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// ID of a tenant where the client application is added
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// A string containing the value of an expected dNSName SAN entry in the certificate.
	TLSClientAuthSanDNS string `json:"tls_client_auth_san_dns,omitempty" yaml:"tls_client_auth_san_dns,omitempty"`

	// A string containing the value of an expected rfc822Name SAN entry in the certificate.
	TLSClientAuthSanEmail string `json:"tls_client_auth_san_email,omitempty" yaml:"tls_client_auth_san_email,omitempty"`

	// A string representation of an IP address in either dotted decimal notation (for IPv4) or colon-delimited hexadecimal (for IPv6, as defined in [RFC5952]) that is expected to be present as an iPAddress SAN entry in the certificate.
	TLSClientAuthSanIP string `json:"tls_client_auth_san_ip,omitempty" yaml:"tls_client_auth_san_ip,omitempty"`

	// A string containing the value of an expected uniformResourceIdentifier SAN entry in the certificate.
	TLSClientAuthSanURI string `json:"tls_client_auth_san_uri,omitempty" yaml:"tls_client_auth_san_uri,omitempty"`

	// An [RFC4514] string representation of the expected subject distinguished name of the certificate.
	TLSClientAuthSubjectDn string `json:"tls_client_auth_subject_dn,omitempty" yaml:"tls_client_auth_subject_dn,omitempty"`

	// Boolean value indicating server support for mutual TLS client certificate-bound access tokens. If omitted, the default value is "false".
	TLSClientCertificateBoundAccessTokens bool `json:"tls_client_certificate_bound_access_tokens,omitempty" yaml:"tls_client_certificate_bound_access_tokens,omitempty"`

	// Token endpoint authentication method configured for a client application
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// To learn more, go to the Authorization Basics > Client Authentication section of this guide.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	TokenEndpointAuthMethod string `json:"token_endpoint_auth_method,omitempty" yaml:"token_endpoint_auth_method,omitempty"`

	// Signing algorithm for the token endpoint
	//
	// This field is optional. If empty, a client can use any algorithm supported by the server (see `token_endpoint_auth_signing_alg_values_supported` in the well-known endpoing).
	//
	// If provided, depending on the server configuration, client can use of one: HS256, RS256, ES256, PS256 algorithms.
	//
	// If your token endpoint authentication is set to the `private_key_jwt` method, the
	// `token_endpoint_auth_signing_alg` parameter must be either RS256, ES256, or PS256.
	//
	// If your token endpoint authentication is set to the `client_secret_jwt` method,
	// the `token_endpoint_auth_signing_alg` parameter must be HS256.
	// Example: ES256
	// Enum: [RS256 ES256 PS256 HS256 ]
	TokenEndpointAuthSigningAlg string `json:"token_endpoint_auth_signing_alg,omitempty" yaml:"token_endpoint_auth_signing_alg,omitempty"`

	// token exchange
	TokenExchange *ClientTokenExchangeConfiguration `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"`

	// token ttls
	TokenTtls *TokenTTLs `json:"token_ttls,omitempty" yaml:"token_ttls,omitempty"`

	// Terms of Service URL.
	TosURI string `json:"tos_uri,omitempty" yaml:"tos_uri,omitempty"`

	// Defines whether the client application is trusted or not.
	//
	// For trusted clients, consent pages are skipped during the authorization process.
	Trusted bool `json:"trusted,omitempty" yaml:"trusted,omitempty"`

	// Date when the client application was updated.
	// Example: 2022-05-08T01:11:51.1262916Z
	// Format: date-time
	UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"`

	// If enabled the client application will be able to set its own token TTLs.
	UseCustomTokenTtls bool `json:"use_custom_token_ttls,omitempty" yaml:"use_custom_token_ttls,omitempty"`

	// JWS alg algorithm REQUIRED for signing UserInfo Responses.
	//
	// If specified, the response is a JWT serialized and signed with JWS.
	//
	// If omitted, then by default, UserInfo Response returns the Claims
	// as an UTF-8 encoded JSON object using the application/json content-type.
	// Example: none
	// Enum: [none RS256 ES256]
	UserinfoSignedResponseAlg string `json:"userinfo_signed_response_alg,omitempty" yaml:"userinfo_signed_response_alg,omitempty"`
}

ClientAdminResponse client admin response

swagger:model ClientAdminResponse

func (*ClientAdminResponse) ContextValidate ¶

func (m *ClientAdminResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this client admin response based on the context it is used

func (*ClientAdminResponse) MarshalBinary ¶

func (m *ClientAdminResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ClientAdminResponse) UnmarshalBinary ¶

func (m *ClientAdminResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ClientAdminResponse) Validate ¶

func (m *ClientAdminResponse) Validate(formats strfmt.Registry) error

Validate validates this client admin response

type ClientAuditPayload ¶

type ClientAuditPayload struct {

	// The client application type.
	//
	// Client applications can be either of a `web` or `native` types.
	//
	// Web applications include clients like server web applications or service apps.
	//
	// Native applications include single-page applications (SPAs) and mobile or desktop
	// applications.
	//
	// Apply security measures according to the type of your application.
	// Example: web
	ApplicationType string `json:"application_type,omitempty" yaml:"application_type,omitempty"`

	// An array of dynamically calculated application types that can be used for filtering
	// Example: ["single_page","server_web","mobile_desktop","service","legacy","dcr"]
	// Read Only: true
	ApplicationTypes []string `json:"application_types" yaml:"application_types"`

	// Identity of the intended recipients (the audience).
	//
	// Typically, the audience is a single resource server or a list of resource servers.
	//
	// It is considered a good practice to limit the audience of the token for security purposes.
	Audience []string `json:"audience" yaml:"audience"`

	// Authorization details types
	//
	// Indicates what authorization details types the client can use.
	AuthorizationDetailsTypes []AuthorizationDetailType `json:"authorization_details_types" yaml:"authorization_details_types"`

	// Algorithm used for encrypting authorization responses.
	//
	// If both signing and encryption are requested, the response is first signed, and then encrypted.
	// As a result, a Nested JWT is obtained, as defined in JWT [RFC7519].
	//
	// If omitted, no encryption is applied by default.
	// Example: RSA-OAEP-256
	// Enum: [RSA-OAEP RSA-OAEP-256]
	AuthorizationEncryptedResponseAlg string `json:"authorization_encrypted_response_alg,omitempty" yaml:"authorization_encrypted_response_alg,omitempty"`

	// Algorithm used for encrypting authorization responses.
	//
	// With `authorization_encrypted_response_alg` specified, the default value is `A128CBC-HS256`.
	// When `authorization_encrypted_response_enc` is included, `authorization_encrypted_response_alg`
	// MUST also be provided in a request.
	// Example: A128CBC-HS256
	// Enum: [A256GCM A128CBC-HS256]
	AuthorizationEncryptedResponseEnc string `json:"authorization_encrypted_response_enc,omitempty" yaml:"authorization_encrypted_response_enc,omitempty"`

	// An authorization server (workspace) identifier holding the client application.
	// Example: default
	// Required: true
	AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"`

	// Algorithm used for signing authorization responses.
	//
	// With this parameter specified, the response is signed using JWS and according to the configured algorithm.
	//
	// `none` isn't allowed.
	// Example: RS256
	AuthorizationSignedResponseAlg string `json:"authorization_signed_response_alg,omitempty" yaml:"authorization_signed_response_alg,omitempty"`

	// OPTIONAL. The JWS alg algorithm value used by the client application to sign authentication requests.
	//
	// When omitted, the client application doesn't send signed authentication requests.
	BackchannelAuthenticationRequestSigningAlg string `` /* 127-byte string literal not displayed */

	// REQUIRED for requests when the client application uses CIBA as an authorization grant type, and the token
	// delivery mode is set to `ping` or `push`.
	//
	// This parameter is the endpoint where an OP (OpenID Provider) posts a notification after end-user authentication.
	//
	// Input: an HTTPS URL.
	BackchannelClientNotificationEndpoint string `json:"backchannel_client_notification_endpoint,omitempty" yaml:"backchannel_client_notification_endpoint,omitempty"`

	// REQUIRED for requests when the client application uses CIBA as an authorization grant type.
	//
	// Input: `poll`, `ping`, or `push`.
	BackchannelTokenDeliveryMode string `json:"backchannel_token_delivery_mode,omitempty" yaml:"backchannel_token_delivery_mode,omitempty"`

	// OPTIONAL. A boolean value indicating the `user_code` parameter support by the client application.
	//
	// If omitted, the default value is `false`.
	//
	// This applies only when the `backchannel_user_code_parameter_supported` OP parameter is `true`.
	BackchannelUserCodeParameter bool `json:"backchannel_user_code_parameter,omitempty" yaml:"backchannel_user_code_parameter,omitempty"`

	// OAuth client application identifier
	//
	// If not provided, a random client ID is generated.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// The client identifier time of issue.
	//
	// The value is the number of seconds between 1970-01-01T00:00:00Z (UTC) and the date/time of issue.
	ClientIDIssuedAt int64 `json:"client_id_issued_at,omitempty" yaml:"client_id_issued_at,omitempty"`

	// Human-readable name of a client application.
	// Example: My app
	ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"`

	// The client secret expiration time.
	//
	// If the client secret does not expire, `client_secret_expires_at` = `0`.
	ClientSecretExpiresAt int64 `json:"client_secret_expires_at,omitempty" yaml:"client_secret_expires_at,omitempty"`

	// Defines whether the client application is active or not.
	//
	// Only clients with the `Active` status can preform authorization, authentication, and PAR requests.
	// Enum: [active inactive]
	ClientStatus string `json:"client_status,omitempty" yaml:"client_status,omitempty"`

	// URI of a client application.
	ClientURI string `json:"client_uri,omitempty" yaml:"client_uri,omitempty"`

	// Date when the client application was created.
	// Example: 2022-04-07T19:17:31.323187Z
	// Format: date-time
	CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"`

	// Description of the client application.
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Optional developer owner of the client application.
	DeveloperID string `json:"developer_id,omitempty" yaml:"developer_id,omitempty"`

	// developer metadata
	DeveloperMetadata Metadata `json:"developer_metadata,omitempty" yaml:"developer_metadata,omitempty"`

	// Boolean value specifying whether the client always uses DPoP for token requests
	// If true, the authorization server will reject token requests from this client that do not contain the DPoP header.
	DpopBoundAccessTokens bool `json:"dpop_bound_access_tokens,omitempty" yaml:"dpop_bound_access_tokens,omitempty"`

	// dynamically registered
	DynamicallyRegistered bool `json:"dynamically_registered,omitempty" yaml:"dynamically_registered,omitempty"`

	// An array of allowed OAuth client grant types.
	//
	// The `grantTypes` array stores OAuth flows that are allowed for a given client application.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-grant-types/grant-types-overview/) about grant types.
	// Example: ["password","refresh_token","client_credentials","implicit","authorization_code"]
	GrantTypes []string `json:"grant_types" yaml:"grant_types"`

	// JWE alg algorithm for encrypting the ID token issued to this client application.
	// Enum: [RSA-OAEP RSA-OAEP-256]
	IDTokenEncryptedResponseAlg string `json:"id_token_encrypted_response_alg,omitempty" yaml:"id_token_encrypted_response_alg,omitempty"`

	// JWE enc algorithm for encrypting the ID token issued to this client application.
	// Enum: [A256GCM A128CBC-HS256]
	IDTokenEncryptedResponseEnc string `json:"id_token_encrypted_response_enc,omitempty" yaml:"id_token_encrypted_response_enc,omitempty"`

	// Algorithm for signing ID tokens issued for a client application.
	//
	// The default value depends on authorization server configuration.
	// Example: ES256
	// Enum: [RS256 ES256 PS256]
	IDTokenSignedResponseAlg string `json:"id_token_signed_response_alg,omitempty" yaml:"id_token_signed_response_alg,omitempty"`

	// An introspection endpoint authentication method configured for the client application (read-only).
	//
	// If empty, the `token_endpoint_auth_method` is used.
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	IntrospectionEndpointAuthMethod string `json:"introspection_endpoint_auth_method,omitempty" yaml:"introspection_endpoint_auth_method,omitempty"`

	// jwks
	Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"`

	// A URL of JSON Web Key Set with the public keys used by a client application to authenticate to Cloudentity.
	JwksURI string `json:"jwks_uri,omitempty" yaml:"jwks_uri,omitempty"`

	// Logo URI.
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// metadata
	Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// External organization identifier. It is a unique string assigned by the CDR Register to identify an Accredited
	// Data Recipient Brand.
	//
	// The value obtained is used as the `aud` claim for message signing, for example, when a JSON Web Token (JWT) is
	// required for authorization, and represents the audience(s) the JWT is intended for.
	// Example: 5647fe90-f6bc-11eb-9a03-0242ac130003
	OrganisationID string `json:"organisation_id,omitempty" yaml:"organisation_id,omitempty"`

	// Policy URL to read about how the profile data is used.
	PolicyURI string `json:"policy_uri,omitempty" yaml:"policy_uri,omitempty"`

	// Array of URLs to which a relying party may request that the user be redirected after a logout has been performed.
	PostLogoutRedirectUris []string `json:"post_logout_redirect_uris" yaml:"post_logout_redirect_uris"`

	// privacy
	Privacy *ClientPrivacy `json:"privacy,omitempty" yaml:"privacy,omitempty"`

	// redirect uris
	RedirectUris RedirectURIs `json:"redirect_uris,omitempty" yaml:"redirect_uris,omitempty"`

	// Optional JWE alg algorithm the client is declaring that it may use for encrypting Request Objects
	// Example: RSA-OAEP
	// Enum: [RSA-OAEP RSA-OAEP-256]
	RequestObjectEncryptionAlg string `json:"request_object_encryption_alg,omitempty" yaml:"request_object_encryption_alg,omitempty"`

	// Optional JWE enc algorithm the client is declaring that it may use for encrypting Request Objects
	// When `request_object_encryption_enc` is included, `request_object_encryption_alg` MUST also be provided.
	// Example: A256GCM
	// Enum: [A256GCM A128CBC-HS256]
	RequestObjectEncryptionEnc string `json:"request_object_encryption_enc,omitempty" yaml:"request_object_encryption_enc,omitempty"`

	// Request object signing algorithm for the token endpoint
	//
	// Cloudentity supports signing tokens with the RS256, ES256, and PS256 algorithms. If you do not want
	// to use a signing algorithm, set the value of this parameter to `none`.
	// Example: none
	// Enum: [any none RS256 ES256 PS256]
	RequestObjectSigningAlg string `json:"request_object_signing_alg,omitempty" yaml:"request_object_signing_alg,omitempty"`

	// Array of absolute URIs that points to the Request Object that holds authorization request parameters.
	RequestUris []string `json:"request_uris" yaml:"request_uris"`

	// Boolean parameter indicating whether the only means of initiating an authorization request the client is allowed to use is PAR.
	RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"`

	// response types
	ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"`

	// A revocation endpoint authentication method configured for the client application (read-only).
	// If empty, the `token_endpoint_auth_method` is used.
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	RevocationEndpointAuthMethod string `json:"revocation_endpoint_auth_method,omitempty" yaml:"revocation_endpoint_auth_method,omitempty"`

	// Space-separated list of scopes for compatibility with the OAuth specification.
	// Example: email offline_access openid
	Scope string `json:"scope,omitempty" yaml:"scope,omitempty"`

	// An array of string represented scopes assigned to a client application
	// Example: ["email","offline_access","openid"]
	Scopes []string `json:"scopes" yaml:"scopes"`

	// OPTIONAL. [A URL using the HTTPS scheme](https://openid.net/specs/openid-connect-registration-1_0.html#SectorIdentifierValidation).
	// It must reference a JSON file with the array of `redirect_uri` values.
	//
	// Pass this parameter when you use multiple domains in your `redirect_uris` or need a mechanism to allow changes in
	// domain without affecting consumer consent.
	//
	// [Read more](https://openid.net/specs/openid-connect-core-1_0.html)
	SectorIdentifierURI string `json:"sector_identifier_uri,omitempty" yaml:"sector_identifier_uri,omitempty"`

	// A digitally signed or MACed JSON Web Token (JWT) [RFC7519] that
	// asserts metadata values about the client software.  In some cases,
	// a software statement is issued directly by the client
	// developer.  In other cases, a software statement is issued by
	// a third-party organization for use by the client developer.
	//
	// In both cases, the trust relationship the authorization server has
	// with the issuer of the software statement is intended to be used
	// as an input to the evaluation of whether the registration request
	// is accepted.
	//
	// A software statement can be presented to an
	// authorization server as part of the client registration request.
	SoftwareStatement string `json:"software_statement,omitempty" yaml:"software_statement,omitempty"`

	// software statement payload
	SoftwareStatementPayload Metadata `json:"software_statement_payload,omitempty" yaml:"software_statement_payload,omitempty"`

	// Subject identifier type
	//
	// Stores information if the subject identifier is of the `public` or the `pairwise` type.
	//
	// Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer,
	// and are intended to be consumed by client applications. There are two types
	// of subject identifiers: `public` and `pairwise`.
	//
	// For the `public` type, the value of the `sub` (subject) token claim is the same for all clients.
	//
	// For the `pairwise` type, a different `sub` (subject) token claim is provided for each client.
	// Using the `pairwise` subject identifier makes it impossible for client applications to correlate the end-user's
	// activity without their permission.
	// Example: public
	// Enum: [public pairwise]
	SubjectType string `json:"subject_type,omitempty" yaml:"subject_type,omitempty"`

	// Defines whether the client application is a system tenant's application or not.
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// ID of a tenant where the client application is added
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// A string containing the value of an expected dNSName SAN entry in the certificate.
	TLSClientAuthSanDNS string `json:"tls_client_auth_san_dns,omitempty" yaml:"tls_client_auth_san_dns,omitempty"`

	// A string containing the value of an expected rfc822Name SAN entry in the certificate.
	TLSClientAuthSanEmail string `json:"tls_client_auth_san_email,omitempty" yaml:"tls_client_auth_san_email,omitempty"`

	// A string representation of an IP address in either dotted decimal notation (for IPv4) or colon-delimited hexadecimal (for IPv6, as defined in [RFC5952]) that is expected to be present as an iPAddress SAN entry in the certificate.
	TLSClientAuthSanIP string `json:"tls_client_auth_san_ip,omitempty" yaml:"tls_client_auth_san_ip,omitempty"`

	// A string containing the value of an expected uniformResourceIdentifier SAN entry in the certificate.
	TLSClientAuthSanURI string `json:"tls_client_auth_san_uri,omitempty" yaml:"tls_client_auth_san_uri,omitempty"`

	// An [RFC4514] string representation of the expected subject distinguished name of the certificate.
	TLSClientAuthSubjectDn string `json:"tls_client_auth_subject_dn,omitempty" yaml:"tls_client_auth_subject_dn,omitempty"`

	// Boolean value indicating server support for mutual TLS client certificate-bound access tokens. If omitted, the default value is "false".
	TLSClientCertificateBoundAccessTokens bool `json:"tls_client_certificate_bound_access_tokens,omitempty" yaml:"tls_client_certificate_bound_access_tokens,omitempty"`

	// Token endpoint authentication method configured for a client application
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// To learn more, go to the Authorization Basics > Client Authentication section of this guide.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	TokenEndpointAuthMethod string `json:"token_endpoint_auth_method,omitempty" yaml:"token_endpoint_auth_method,omitempty"`

	// Signing algorithm for the token endpoint
	//
	// This field is optional. If empty, a client can use any algorithm supported by the server (see `token_endpoint_auth_signing_alg_values_supported` in the well-known endpoing).
	//
	// If provided, depending on the server configuration, client can use of one: HS256, RS256, ES256, PS256 algorithms.
	//
	// If your token endpoint authentication is set to the `private_key_jwt` method, the
	// `token_endpoint_auth_signing_alg` parameter must be either RS256, ES256, or PS256.
	//
	// If your token endpoint authentication is set to the `client_secret_jwt` method,
	// the `token_endpoint_auth_signing_alg` parameter must be HS256.
	// Example: ES256
	// Enum: [RS256 ES256 PS256 HS256 ]
	TokenEndpointAuthSigningAlg string `json:"token_endpoint_auth_signing_alg,omitempty" yaml:"token_endpoint_auth_signing_alg,omitempty"`

	// token exchange
	TokenExchange *ClientTokenExchangeConfiguration `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"`

	// token ttls
	TokenTtls *TokenTTLs `json:"token_ttls,omitempty" yaml:"token_ttls,omitempty"`

	// Terms of Service URL.
	TosURI string `json:"tos_uri,omitempty" yaml:"tos_uri,omitempty"`

	// Defines whether the client application is trusted or not.
	//
	// For trusted clients, consent pages are skipped during the authorization process.
	Trusted bool `json:"trusted,omitempty" yaml:"trusted,omitempty"`

	// Date when the client application was updated.
	// Example: 2022-05-08T01:11:51.1262916Z
	// Format: date-time
	UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"`

	// If enabled the client application will be able to set its own token TTLs.
	UseCustomTokenTtls bool `json:"use_custom_token_ttls,omitempty" yaml:"use_custom_token_ttls,omitempty"`

	// JWS alg algorithm REQUIRED for signing UserInfo Responses.
	//
	// If specified, the response is a JWT serialized and signed with JWS.
	//
	// If omitted, then by default, UserInfo Response returns the Claims
	// as an UTF-8 encoded JSON object using the application/json content-type.
	// Example: none
	// Enum: [none RS256 ES256]
	UserinfoSignedResponseAlg string `json:"userinfo_signed_response_alg,omitempty" yaml:"userinfo_signed_response_alg,omitempty"`
}

ClientAuditPayload client audit payload

swagger:model ClientAuditPayload

func (*ClientAuditPayload) ContextValidate ¶

func (m *ClientAuditPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this client audit payload based on the context it is used

func (*ClientAuditPayload) MarshalBinary ¶

func (m *ClientAuditPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ClientAuditPayload) UnmarshalBinary ¶

func (m *ClientAuditPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ClientAuditPayload) Validate ¶

func (m *ClientAuditPayload) Validate(formats strfmt.Registry) error

Validate validates this client audit payload

type ClientConsentsAuditEventPayload ¶

type ClientConsentsAuditEventPayload struct {

	// client id
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// number of consents revoked
	NumberRevoked int64 `json:"number_revoked,omitempty" yaml:"number_revoked,omitempty"`
}

ClientConsentsAuditEventPayload client consents audit event payload

swagger:model ClientConsentsAuditEventPayload

func (*ClientConsentsAuditEventPayload) ContextValidate ¶

func (m *ClientConsentsAuditEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this client consents audit event payload based on context it is used

func (*ClientConsentsAuditEventPayload) MarshalBinary ¶

func (m *ClientConsentsAuditEventPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ClientConsentsAuditEventPayload) UnmarshalBinary ¶

func (m *ClientConsentsAuditEventPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ClientConsentsAuditEventPayload) Validate ¶

Validate validates this client consents audit event payload

type ClientJWK ¶

type ClientJWK struct {

	// The "alg" (algorithm) parameter identifies the algorithm intended for
	// use with the key.  The values used should either be registered in the
	// IANA "JSON Web Signature and Encryption Algorithms" registry
	// established by [JWA] or be a value that contains a Collision-
	// Resistant Name.
	// Example: RS256
	Alg string `json:"alg,omitempty" yaml:"alg,omitempty"`

	// crv
	// Example: P-256
	Crv string `json:"crv,omitempty" yaml:"crv,omitempty"`

	// d
	// Example: T_N8I-6He3M8a7X1vWt6TGIx4xB_GP3Mb4SsZSA4v-orvJzzRiQhLlRR81naWYxfQAYt5isDI6_C2L9bdWo4FFPjGQFvNoRX-_sBJyBI_rl-TBgsZYoUlAj3J92WmY2inbA-PwyJfsaIIDceYBC-eX-xiCu6qMqkZi3MwQAFL6bMdPEM0z4JBcwFT3VdiWAIRUuACWQwrXMq672x7fMuaIaHi7XDGgt1ith23CLfaREmJku9PQcchbt_uEY-hqrFY6ntTtS4paWWQj86xLL94S-Tf6v6xkL918PfLSOTq6XCzxvlFwzBJqApnAhbwqLjpPhgUG04EDRrqrSBc5Y1BLevn6Ip5h1AhessBp3wLkQgz_roeckt-ybvzKTjESMuagnpqLvOT7Y9veIug2MwPJZI2VjczRc1vzMs25XrFQ8DpUy-bNdp89TmvAXwctUMiJdgHloJw23Cv03gIUAkDnsTqZmkpbIf-crpgNKFmQP_EDKoe8p_PXZZgfbRri3NoEVGP7Mk6yEu8LjJhClhZaBNjuWw2-KlBfOA3g79mhfBnkInee5KO9mGR50qPk1V-MorUYNTFMZIm0kFE6eYVWFBwJHLKYhHU34DoiK1VP-svZpC2uAMFNA_UJEwM9CQ2b8qe4-5e9aywMvwcuArRkAB5mBIfOaOJao3mfukKAE
	D string `json:"d,omitempty" yaml:"d,omitempty"`

	// dp
	// Example: G4sPXkc6Ya9y8oJW9_ILj4xuppu0lzi_H7VTkS8xj5SdX3coE0oimYwxIi2emTAue0UOa5dpgFGyBJ4c8tQ2VF402XRugKDTP8akYhFo5tAA77Qe_NmtuYZc3C3m3I24G2GvR5sSDxUyAN2zq8Lfn9EUms6rY3Ob8YeiKkTiBj0
	Dp string `json:"dp,omitempty" yaml:"dp,omitempty"`

	// dq
	// Example: s9lAH9fggBsoFR8Oac2R_E2gw282rT2kGOAhvIllETE1efrA6huUUvMfBcMpn8lqeW6vzznYY5SSQF7pMdC_agI3nG8Ibp1BUb0JUiraRNqUfLhcQb_d9GF4Dh7e74WbRsobRonujTYN1xCaP6TO61jvWrX-L18txXw494Q_cgk
	Dq string `json:"dq,omitempty" yaml:"dq,omitempty"`

	// e
	// Example: AQAB
	E string `json:"e,omitempty" yaml:"e,omitempty"`

	// k
	// Example: GawgguFyGrWKav7AX4VKUg
	K string `json:"k,omitempty" yaml:"k,omitempty"`

	// The "kid" (key ID) parameter is used to match a specific key.  This
	// is used, for instance, to choose among a set of keys within a JWK Set
	// during key rollover.  The structure of the "kid" value is
	// unspecified.  When "kid" values are used within a JWK Set, different
	// keys within the JWK Set SHOULD use distinct "kid" values.  (One
	// example in which different keys might use the same "kid" value is if
	// they have different "kty" (key type) values but are considered to be
	// equivalent alternatives by the application using them.)  The "kid"
	// value is a case-sensitive string.
	// Example: 1603dfe0af8f4596
	Kid string `json:"kid,omitempty" yaml:"kid,omitempty"`

	// The "kty" (key type) parameter identifies the cryptographic algorithm
	// family used with the key, such as "RSA" or "EC". "kty" values should
	// either be registered in the IANA "JSON Web Key Types" registry
	// established by [JWA] or be a value that contains a Collision-
	// Resistant Name.  The "kty" value is a case-sensitive string.
	// Example: RSA
	// Required: true
	Kty string `json:"kty" yaml:"kty"`

	// n
	// Example: vTqrxUyQPl_20aqf5kXHwDZrel-KovIp8s7ewJod2EXHl8tWlRB3_Rem34KwBfqlKQGp1nqah-51H4Jzruqe0cFP58hPEIt6WqrvnmJCXxnNuIB53iX_uUUXXHDHBeaPCSRoNJzNysjoJ30TIUsKBiirhBa7f235PXbKiHducLevV6PcKxJ5cY8zO286qJLBWSPm-OIevwqsIsSIH44Qtm9sioFikhkbLwoqwWORGAY0nl6XvVOlhADdLjBSqSAeT1FPuCDCnXwzCDR8N9IFB_IjdStFkC-rVt2K5BYfPd0c3yFp_vHR15eRd0zJ8XQ7woBC8Vnsac6Et1pKS59pX6256DPWu8UDdEOolKAPgcd_g2NpA76cAaF_jcT80j9KrEzw8Tv0nJBGesuCjPNjGs_KzdkWTUXt23Hn9QJsdc1MZuaW0iqXBepHYfYoqNelzVte117t4BwVp0kUM6we0IqyXClaZgOI8S-WDBw2_Ovdm8e5NmhYAblEVoygcX8Y46oH6bKiaCQfKCFDMcRgChme7AoE1yZZYsPbaG_3IjPrC4LBMHQw8rM9dWjJ8ImjicvZ1pAm0dx-KHCP3y5PVKrxBDf1zSOsBRkOSjB8TPODnJMz6-jd5hTtZxpZPwPoIdCanTZ3ZD6uRBpTmDwtpRGm63UQs1m5FWPwb0T2IF0
	N string `json:"n,omitempty" yaml:"n,omitempty"`

	// p
	// Example: 6NbkXwDWUhi-eR55Cgbf27FkQDDWIamOaDr0rj1q0f1fFEz1W5A_09YvG09Fiv1AO2-D8Rl8gS1Vkz2i0zCSqnyy8A025XOcRviOMK7nIxE4OH_PEsko8dtIrb3TmE2hUXvCkmzw9EsTF1LQBOGC6iusLTXepIC1x9ukCKFZQvdgtEObQ5kzd9Nhq-cdqmSeMVLoxPLd1blviVT9Vm8-y12CtYpeJHOaIDtVPLlBhJiBoPKWg3vxSm4XxIliNOefqegIlsmTIa3MpS6WWlCK3yHhat0Q-rRxDxdyiVdG_wzJvp0Iw_2wms7pe-PgNPYvUWH9JphWP5K38YqEBiJFXQ
	P string `json:"p,omitempty" yaml:"p,omitempty"`

	// q
	// Example: 0A1FmpOWR91_RAWpqreWSavNaZb9nXeKiBo0DQGBz32DbqKqQ8S4aBJmbRhJcctjCLjain-ivut477tAUMmzJwVJDDq2MZFwC9Q-4VYZmFU4HJityQuSzHYe64RjN-E_NQ02TWhG3QGW6roq6c57c99rrUsETwJJiwS8M5p15Miuz53DaOjv-uqqFAFfywN5WkxHbraBcjHtMiQuyQbQqkCFh-oanHkwYNeytsNhTu2mQmwR5DR2roZ2nPiFjC6nsdk-A7E3S3wMzYYFw7jvbWWoYWo9vB40_MY2Y0FYQSqcDzcBIcq_0tnnasf3VW4Fdx6m80RzOb2Fsnln7vKXAQ
	Q string `json:"q,omitempty" yaml:"q,omitempty"`

	// qi
	// Example: GyM_p6JrXySiz1toFgKbWV-JdI3jQ4ypu9rbMWx3rQJBfmt0FoYzgUIZEVFEcOqwemRN81zoDAaa-Bk0KWNGDjJHZDdDmFhW3AN7lI-puxk_mHZGJ11rxyR8O55XLSe3SPmRfKwZI6yU24ZxvQKFYItdldUKGzO6Ia6zTKhAVRU
	Qi string `json:"qi,omitempty" yaml:"qi,omitempty"`

	// Use ("public key use") identifies the intended use of
	// the public key. The "use" parameter is employed to indicate whether
	// a public key is used for encrypting data or verifying the signature
	// on data. Values are commonly "sig" (signature) or "enc" (encryption).
	// Example: sig
	Use string `json:"use,omitempty" yaml:"use,omitempty"`

	// x
	// Example: f83OJ3D2xF1Bg8vub9tLe1gHMzV76e8Tus9uPHvRVEU
	X string `json:"x,omitempty" yaml:"x,omitempty"`

	// The "x5c" (X.509 certificate chain) parameter contains a chain of one
	// or more PKIX certificates [RFC5280].  The certificate chain is
	// represented as a JSON array of certificate value strings.  Each
	// string in the array is a base64-encoded (Section 4 of [RFC4648] --
	// not base64url-encoded) DER [ITU.X690.1994] PKIX certificate value.
	// The PKIX certificate containing the key value MUST be the first
	// certificate.
	X5c []string `json:"x5c" yaml:"x5c"`

	// x5t
	// Example: GawgguFyGrWKav7AX4VKUg
	X5t string `json:"x5t,omitempty" yaml:"x5t,omitempty"`

	// x5t s256
	// Example: GawgguFyGrWKav7AX4VKUg
	X5tS256 string `json:"x5t#S256,omitempty" yaml:"x5t#S256,omitempty"`

	// y
	// Example: x_FEzRu9m36HLN_tue659LNpXW6pCyStikYjKIWI5a0
	Y string `json:"y,omitempty" yaml:"y,omitempty"`
}

ClientJWK client j w k

swagger:model ClientJWK

func (*ClientJWK) ContextValidate ¶

func (m *ClientJWK) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this client j w k based on context it is used

func (*ClientJWK) MarshalBinary ¶

func (m *ClientJWK) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ClientJWK) UnmarshalBinary ¶

func (m *ClientJWK) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ClientJWK) Validate ¶

func (m *ClientJWK) Validate(formats strfmt.Registry) error

Validate validates this client j w k

type ClientJWKs ¶

type ClientJWKs struct {

	// keys
	// Example: []
	Keys []*ClientJWK `json:"keys" yaml:"keys"`
}

ClientJWKs client j w ks

swagger:model ClientJWKs

func (*ClientJWKs) ContextValidate ¶

func (m *ClientJWKs) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this client j w ks based on the context it is used

func (*ClientJWKs) MarshalBinary ¶

func (m *ClientJWKs) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ClientJWKs) UnmarshalBinary ¶

func (m *ClientJWKs) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ClientJWKs) Validate ¶

func (m *ClientJWKs) Validate(formats strfmt.Registry) error

Validate validates this client j w ks

type ClientPrivacy ¶

type ClientPrivacy struct {

	// optional privacy information mapping for scopes
	Scopes map[string]ScopePrivacyInformation `json:"scopes,omitempty" yaml:"scopes,omitempty"`
}

ClientPrivacy client privacy

swagger:model ClientPrivacy

func (*ClientPrivacy) ContextValidate ¶

func (m *ClientPrivacy) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this client privacy based on the context it is used

func (*ClientPrivacy) MarshalBinary ¶

func (m *ClientPrivacy) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ClientPrivacy) UnmarshalBinary ¶

func (m *ClientPrivacy) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ClientPrivacy) Validate ¶

func (m *ClientPrivacy) Validate(formats strfmt.Registry) error

Validate validates this client privacy

type ClientTokenExchangeConfiguration ¶

type ClientTokenExchangeConfiguration struct {

	// Additional actor token claims
	//
	// Claims from the actor token that will be injected into the exchanged token under the `act` claim.
	//
	// Applies for the token exchange delegation flow only.
	ActorClaims []string `json:"actor_claims" yaml:"actor_claims"`
}

ClientTokenExchangeConfiguration client token exchange configuration

swagger:model ClientTokenExchangeConfiguration

func (*ClientTokenExchangeConfiguration) ContextValidate ¶

func (m *ClientTokenExchangeConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this client token exchange configuration based on context it is used

func (*ClientTokenExchangeConfiguration) MarshalBinary ¶

func (m *ClientTokenExchangeConfiguration) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ClientTokenExchangeConfiguration) UnmarshalBinary ¶

func (m *ClientTokenExchangeConfiguration) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ClientTokenExchangeConfiguration) Validate ¶

Validate validates this client token exchange configuration

type ClientsForAdmin ¶

type ClientsForAdmin struct {

	// clients
	Clients []*ClientAdminResponse `json:"clients" yaml:"clients"`
}

ClientsForAdmin clients for admin

swagger:model ClientsForAdmin

func (*ClientsForAdmin) ContextValidate ¶

func (m *ClientsForAdmin) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this clients for admin based on the context it is used

func (*ClientsForAdmin) MarshalBinary ¶

func (m *ClientsForAdmin) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ClientsForAdmin) UnmarshalBinary ¶

func (m *ClientsForAdmin) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ClientsForAdmin) Validate ¶

func (m *ClientsForAdmin) Validate(formats strfmt.Registry) error

Validate validates this clients for admin

type CognitoCredentials ¶

type CognitoCredentials struct {

	// Cognito app client secret from your application settings
	ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"`
}

CognitoCredentials Cognito IDP specific settings

swagger:model CognitoCredentials

func (*CognitoCredentials) ContextValidate ¶

func (m *CognitoCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this cognito credentials based on context it is used

func (*CognitoCredentials) MarshalBinary ¶

func (m *CognitoCredentials) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CognitoCredentials) UnmarshalBinary ¶

func (m *CognitoCredentials) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CognitoCredentials) Validate ¶

func (m *CognitoCredentials) Validate(formats strfmt.Registry) error

Validate validates this cognito credentials

type CognitoIDP ¶

type CognitoIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// credentials
	Credentials *CognitoCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// settings
	Settings *CognitoSettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

CognitoIDP cognito ID p

swagger:model CognitoIDP

func (*CognitoIDP) ContextValidate ¶

func (m *CognitoIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this cognito ID p based on the context it is used

func (*CognitoIDP) MarshalBinary ¶

func (m *CognitoIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CognitoIDP) UnmarshalBinary ¶

func (m *CognitoIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CognitoIDP) Validate ¶

func (m *CognitoIDP) Validate(formats strfmt.Registry) error

Validate validates this cognito ID p

type CognitoSettings ¶

type CognitoSettings struct {

	// Cognito app client ID from your application settings
	// Example: client
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// If enabled, additional user data is collected from the `userinfo` Cognito API
	GetUserInfo bool `json:"get_user_info,omitempty" yaml:"get_user_info,omitempty"`

	// Cognito pool ID
	//
	// A user pool is a user directory in Amazon Cognito. It enables your users to sign in to your
	// application through Amazon Cognito. You can find your pool ID in your User Pools > Federated
	// Identities settings.
	PoolID string `json:"pool_id,omitempty" yaml:"pool_id,omitempty"`

	// AWS Region where the user pool is hosted
	// Example: us-east-1
	Region string `json:"region,omitempty" yaml:"region,omitempty"`

	// An array of allowed OAuth scopes which the client requests
	//
	// The following scopes can be allowed for a Cognito application:
	// `phone`, `email`, `openid`, `aws.cognito.signin.user.admin`, `profile`.
	// Example: ["email","profile","openid"]
	Scopes []string `json:"scopes" yaml:"scopes"`

	// Whether to send the identifier as a `login_hint` parameter to the IDP
	SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"`
}

CognitoSettings Cognito IDP specific settings

swagger:model CognitoSettings

func (*CognitoSettings) ContextValidate ¶

func (m *CognitoSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this cognito settings based on context it is used

func (*CognitoSettings) MarshalBinary ¶

func (m *CognitoSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CognitoSettings) UnmarshalBinary ¶

func (m *CognitoSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CognitoSettings) Validate ¶

func (m *CognitoSettings) Validate(formats strfmt.Registry) error

Validate validates this cognito settings

type Confirmation ¶

type Confirmation struct {

	// jkt
	Jkt string `json:"jkt,omitempty" yaml:"jkt,omitempty"`

	// x5t s256
	X5tS256 string `json:"x5t#S256,omitempty" yaml:"x5t#S256,omitempty"`
}

Confirmation confirmation

swagger:model Confirmation

func (*Confirmation) ContextValidate ¶

func (m *Confirmation) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this confirmation based on context it is used

func (*Confirmation) MarshalBinary ¶

func (m *Confirmation) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Confirmation) UnmarshalBinary ¶

func (m *Confirmation) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Confirmation) Validate ¶

func (m *Confirmation) Validate(formats strfmt.Registry) error

Validate validates this confirmation

type Consent struct {

	// flag determining if can user withdrawn consent
	// Example: false
	CanBeWithdrawn bool `json:"can_be_withdrawn,omitempty" yaml:"can_be_withdrawn,omitempty"`

	// consent description
	// Example: End User License Agreement
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// consent unique identifier
	// Example: 1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// internal services
	InternalServices []*ConsentService `json:"internal_services" yaml:"internal_services"`

	// consent name
	// Example: EULA
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// PII Categories
	PiiCategories []*PIICategory `json:"pii_categories" yaml:"pii_categories"`

	// tenant id
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// third party services
	ThirdPartyServices []*ConsentService `json:"third_party_services" yaml:"third_party_services"`

	// strategy for upading existing grants, one of: explicitAll, implicitAll, keepCurrent
	// Example: explicitAll
	UpdateExistingGrants string `json:"update_existing_grants,omitempty" yaml:"update_existing_grants,omitempty"`

	// marks the time from which the consent is in use. Can't be set to a future time
	// Example: 2019-12-11T13:44:28.772101Z
	// Format: date-time
	ValidFrom strfmt.DateTime `json:"valid_from,omitempty" yaml:"valid_from,omitempty"`

	// consent version. When a consent is updated, version is incremented.
	// Example: 1
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`
}

Consent consent

swagger:model Consent

func (*Consent) ContextValidate ¶

func (m *Consent) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this consent based on the context it is used

func (*Consent) MarshalBinary ¶

func (m *Consent) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Consent) UnmarshalBinary ¶

func (m *Consent) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Consent) Validate ¶

func (m *Consent) Validate(formats strfmt.Registry) error

Validate validates this consent

type ConsentAction ¶

type ConsentAction struct {

	// consent description
	// Example: Consents required by application X
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// unique consent action id
	// Example: 1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// consent action name
	// Example: application_x
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// tenant id
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`
}

ConsentAction consent action

swagger:model ConsentAction

func (*ConsentAction) ContextValidate ¶

func (m *ConsentAction) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this consent action based on context it is used

func (*ConsentAction) MarshalBinary ¶

func (m *ConsentAction) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ConsentAction) UnmarshalBinary ¶

func (m *ConsentAction) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ConsentAction) Validate ¶

func (m *ConsentAction) Validate(formats strfmt.Registry) error

Validate validates this consent action

type ConsentActionToConsent ¶

type ConsentActionToConsent struct {

	// flag determining if can user withdrawn consent
	// Example: false
	CanBeWithdrawn bool `json:"can_be_withdrawn,omitempty" yaml:"can_be_withdrawn,omitempty"`

	// consent description
	// Example: End User License Agreement
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// consent unique identifier
	// Example: 1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// internal services
	InternalServices []*ConsentService `json:"internal_services" yaml:"internal_services"`

	// consent name
	// Example: EULA
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// PII Categories
	PiiCategories []*PIICategory `json:"pii_categories" yaml:"pii_categories"`

	// is consent required
	// Example: false
	Required bool `json:"required,omitempty" yaml:"required,omitempty"`

	// tenant id
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// third party services
	ThirdPartyServices []*ConsentService `json:"third_party_services" yaml:"third_party_services"`

	// strategy for upading existing grants, one of: explicitAll, implicitAll, keepCurrent
	// Example: explicitAll
	UpdateExistingGrants string `json:"update_existing_grants,omitempty" yaml:"update_existing_grants,omitempty"`

	// marks the time from which the consent is in use. Can't be set to a future time
	// Example: 2019-12-11T13:44:28.772101Z
	// Format: date-time
	ValidFrom strfmt.DateTime `json:"valid_from,omitempty" yaml:"valid_from,omitempty"`

	// consent version. When a consent is updated, version is incremented.
	// Example: 1
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`
}

ConsentActionToConsent consent action to consent

swagger:model ConsentActionToConsent

func (*ConsentActionToConsent) ContextValidate ¶

func (m *ConsentActionToConsent) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this consent action to consent based on the context it is used

func (*ConsentActionToConsent) MarshalBinary ¶

func (m *ConsentActionToConsent) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ConsentActionToConsent) UnmarshalBinary ¶

func (m *ConsentActionToConsent) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ConsentActionToConsent) Validate ¶

func (m *ConsentActionToConsent) Validate(formats strfmt.Registry) error

Validate validates this consent action to consent

type ConsentActionWithConsents ¶

type ConsentActionWithConsents struct {

	// consents
	Consents []*ConsentActionToConsent `json:"consents" yaml:"consents"`

	// consent description
	// Example: Consents required by application X
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// unique consent action id
	// Example: 1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// consent action name
	// Example: application_x
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// tenant id
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`
}

ConsentActionWithConsents consent action with consents

swagger:model ConsentActionWithConsents

func (*ConsentActionWithConsents) ContextValidate ¶

func (m *ConsentActionWithConsents) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this consent action with consents based on the context it is used

func (*ConsentActionWithConsents) MarshalBinary ¶

func (m *ConsentActionWithConsents) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ConsentActionWithConsents) UnmarshalBinary ¶

func (m *ConsentActionWithConsents) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ConsentActionWithConsents) Validate ¶

func (m *ConsentActionWithConsents) Validate(formats strfmt.Registry) error

Validate validates this consent action with consents

type ConsentActions ¶

type ConsentActions struct {

	// consent actions
	ConsentActions []*ConsentAction `json:"consent_actions" yaml:"consent_actions"`
}

ConsentActions consent actions

swagger:model ConsentActions

func (*ConsentActions) ContextValidate ¶

func (m *ConsentActions) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this consent actions based on the context it is used

func (*ConsentActions) MarshalBinary ¶

func (m *ConsentActions) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ConsentActions) UnmarshalBinary ¶

func (m *ConsentActions) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ConsentActions) Validate ¶

func (m *ConsentActions) Validate(formats strfmt.Registry) error

Validate validates this consent actions

type ConsentAuditEventPayload ¶

type ConsentAuditEventPayload struct {

	// consent
	Consent *ConsentPayload `json:"consent,omitempty" yaml:"consent,omitempty"`
}

ConsentAuditEventPayload consent audit event payload

swagger:model ConsentAuditEventPayload

func (*ConsentAuditEventPayload) ContextValidate ¶

func (m *ConsentAuditEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this consent audit event payload based on the context it is used

func (*ConsentAuditEventPayload) MarshalBinary ¶

func (m *ConsentAuditEventPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ConsentAuditEventPayload) UnmarshalBinary ¶

func (m *ConsentAuditEventPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ConsentAuditEventPayload) Validate ¶

func (m *ConsentAuditEventPayload) Validate(formats strfmt.Registry) error

Validate validates this consent audit event payload

type ConsentDetails ¶

type ConsentDetails struct {

	// br
	Br *BRConsentPayload `json:"br,omitempty" yaml:"br,omitempty"`

	// cdr
	Cdr *CDRArrangement `json:"cdr,omitempty" yaml:"cdr,omitempty"`

	// fdx
	Fdx *FDXConsent `json:"fdx,omitempty" yaml:"fdx,omitempty"`

	// uk
	Uk *UKConsentPayload `json:"uk,omitempty" yaml:"uk,omitempty"`
}

ConsentDetails consent details

swagger:model ConsentDetails

func (*ConsentDetails) ContextValidate ¶

func (m *ConsentDetails) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this consent details based on the context it is used

func (*ConsentDetails) MarshalBinary ¶

func (m *ConsentDetails) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ConsentDetails) UnmarshalBinary ¶

func (m *ConsentDetails) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ConsentDetails) Validate ¶

func (m *ConsentDetails) Validate(formats strfmt.Registry) error

Validate validates this consent details

type ConsentGrantContext ¶

type ConsentGrantContext struct {

	// json object - device print of the End User's device
	Device map[string]interface{} `json:"device,omitempty" yaml:"device,omitempty"`

	// string in the form of a valid IP v 4 address, represents the current IP of the End User
	// Example: 52.14.142.76
	IP string `json:"ip,omitempty" yaml:"ip,omitempty"`

	// 2 element array of floats - current geolocation of the end-user, the format is [lat, long]
	// Example: [25.2084,55.2719]
	Location []float64 `json:"location" yaml:"location"`
}

ConsentGrantContext consent grant context

swagger:model ConsentGrantContext

func (*ConsentGrantContext) ContextValidate ¶

func (m *ConsentGrantContext) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this consent grant context based on context it is used

func (*ConsentGrantContext) MarshalBinary ¶

func (m *ConsentGrantContext) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ConsentGrantContext) UnmarshalBinary ¶

func (m *ConsentGrantContext) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ConsentGrantContext) Validate ¶

func (m *ConsentGrantContext) Validate(formats strfmt.Registry) error

Validate validates this consent grant context

type ConsentGrantedEvent ¶

type ConsentGrantedEvent struct {

	// time when the grant occurred
	// Example: 1257894000000000000
	CollectionTimestamp int64 `json:"collection_timestamp,omitempty" yaml:"collection_timestamp,omitempty"`

	// consent
	Consent *Consent `json:"consent,omitempty" yaml:"consent,omitempty"`

	// consent grant id
	// Example: 27fa83a8-d0a6-48da-8529-42105bfa0ede
	ConsentGrantActID string `json:"consent_grant_act_id,omitempty" yaml:"consent_grant_act_id,omitempty"`

	// consent id
	// Example: 1
	ConsentID string `json:"consent_id,omitempty" yaml:"consent_id,omitempty"`

	// context
	Context *ConsentGrantContext `json:"context,omitempty" yaml:"context,omitempty"`

	// given at timestamp
	// Format: date-time
	GivenAt strfmt.DateTime `json:"given_at,omitempty" yaml:"given_at,omitempty"`

	// grant type, one of: implicit, explicit
	// Example: implicit
	GrantType string `json:"grant_type,omitempty" yaml:"grant_type,omitempty"`

	// language in which the consent was obtained [ISO 639]
	// Example: en
	Language string `json:"language,omitempty" yaml:"language,omitempty"`

	// subject
	// Example: peter
	Subject string `json:"subject,omitempty" yaml:"subject,omitempty"`

	// tenant id
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// optional string with action_id - can be set if the consent grant/withdraw request was caused when an app asked the user for consent required for a specific action
	// Example: 1
	TriggeredByAction string `json:"triggered_by_action,omitempty" yaml:"triggered_by_action,omitempty"`

	// version
	// Example: 1
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`
}

ConsentGrantedEvent consent granted event

swagger:model ConsentGrantedEvent

func (*ConsentGrantedEvent) ContextValidate ¶

func (m *ConsentGrantedEvent) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this consent granted event based on the context it is used

func (*ConsentGrantedEvent) MarshalBinary ¶

func (m *ConsentGrantedEvent) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ConsentGrantedEvent) UnmarshalBinary ¶

func (m *ConsentGrantedEvent) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ConsentGrantedEvent) Validate ¶

func (m *ConsentGrantedEvent) Validate(formats strfmt.Registry) error

Validate validates this consent granted event

type ConsentNotifiedPayload ¶

type ConsentNotifiedPayload struct {

	// Type of notification, specifies what the client was notified of , e.g.: revocation
	NotificationType string `json:"notification_type,omitempty" yaml:"notification_type,omitempty"`

	// payload of the request sent to the notification endpoint
	Payload string `json:"payload,omitempty" yaml:"payload,omitempty"`

	// uri that was notified of the revocation
	URI string `json:"uri,omitempty" yaml:"uri,omitempty"`
}

ConsentNotifiedPayload consent notified payload

swagger:model ConsentNotifiedPayload

func (*ConsentNotifiedPayload) ContextValidate ¶

func (m *ConsentNotifiedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this consent notified payload based on context it is used

func (*ConsentNotifiedPayload) MarshalBinary ¶

func (m *ConsentNotifiedPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ConsentNotifiedPayload) UnmarshalBinary ¶

func (m *ConsentNotifiedPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ConsentNotifiedPayload) Validate ¶

func (m *ConsentNotifiedPayload) Validate(formats strfmt.Registry) error

Validate validates this consent notified payload

type ConsentPayload ¶

type ConsentPayload struct {

	// details
	Details *ConsentDetails `json:"details,omitempty" yaml:"details,omitempty"`

	// consent id
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// kind
	Kind AuditConsentKind `json:"kind,omitempty" yaml:"kind,omitempty"`

	// Type of a consent, specifies the subject of consent, e.g.: domestic_payment
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

ConsentPayload consent payload

swagger:model ConsentPayload

func (*ConsentPayload) ContextValidate ¶

func (m *ConsentPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this consent payload based on the context it is used

func (*ConsentPayload) MarshalBinary ¶

func (m *ConsentPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ConsentPayload) UnmarshalBinary ¶

func (m *ConsentPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ConsentPayload) Validate ¶

func (m *ConsentPayload) Validate(formats strfmt.Registry) error

Validate validates this consent payload

type ConsentRevokedEvent ¶

type ConsentRevokedEvent struct {

	// time when the grant occurred
	// Example: 1257894000000000000
	CollectionTimestamp int64 `json:"collection_timestamp,omitempty" yaml:"collection_timestamp,omitempty"`

	// consent
	Consent *Consent `json:"consent,omitempty" yaml:"consent,omitempty"`

	// consent grant id
	// Example: 27fa83a8-d0a6-48da-8529-42105bfa0ede
	ConsentGrantActID string `json:"consent_grant_act_id,omitempty" yaml:"consent_grant_act_id,omitempty"`

	// consent id
	// Example: 1
	ConsentID string `json:"consent_id,omitempty" yaml:"consent_id,omitempty"`

	// context
	Context *ConsentGrantContext `json:"context,omitempty" yaml:"context,omitempty"`

	// given at timestamp
	// Format: date-time
	GivenAt strfmt.DateTime `json:"given_at,omitempty" yaml:"given_at,omitempty"`

	// grant type, one of: implicit, explicit
	// Example: implicit
	GrantType string `json:"grant_type,omitempty" yaml:"grant_type,omitempty"`

	// language in which the consent was obtained [ISO 639]
	// Example: en
	Language string `json:"language,omitempty" yaml:"language,omitempty"`

	// subject
	// Example: peter
	Subject string `json:"subject,omitempty" yaml:"subject,omitempty"`

	// tenant id
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// optional string with action_id - can be set if the consent grant/withdraw request was caused when an app asked the user for consent required for a specific action
	// Example: 1
	TriggeredByAction string `json:"triggered_by_action,omitempty" yaml:"triggered_by_action,omitempty"`

	// version
	// Example: 1
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`
}

ConsentRevokedEvent consent revoked event

swagger:model ConsentRevokedEvent

func (*ConsentRevokedEvent) ContextValidate ¶

func (m *ConsentRevokedEvent) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this consent revoked event based on the context it is used

func (*ConsentRevokedEvent) MarshalBinary ¶

func (m *ConsentRevokedEvent) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ConsentRevokedEvent) UnmarshalBinary ¶

func (m *ConsentRevokedEvent) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ConsentRevokedEvent) Validate ¶

func (m *ConsentRevokedEvent) Validate(formats strfmt.Registry) error

Validate validates this consent revoked event

type ConsentService ¶

type ConsentService struct {

	// name
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// purpose
	Purposes []*Purpose `json:"purposes" yaml:"purposes"`
}

ConsentService consent service

swagger:model ConsentService

func (*ConsentService) ContextValidate ¶

func (m *ConsentService) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this consent service based on the context it is used

func (*ConsentService) MarshalBinary ¶

func (m *ConsentService) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ConsentService) UnmarshalBinary ¶

func (m *ConsentService) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ConsentService) Validate ¶

func (m *ConsentService) Validate(formats strfmt.Registry) error

Validate validates this consent service

type ConsentStatus ¶

type ConsentStatus string

ConsentStatus consent status

swagger:model ConsentStatus

func (ConsentStatus) ContextValidate ¶

func (m ConsentStatus) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this consent status based on context it is used

func (ConsentStatus) Validate ¶

func (m ConsentStatus) Validate(formats strfmt.Registry) error

Validate validates this consent status

type ConsentType ¶

type ConsentType string

ConsentType consent type

swagger:model ConsentType

func (ConsentType) ContextValidate ¶

func (m ConsentType) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this consent type based on context it is used

func (ConsentType) Validate ¶

func (m ConsentType) Validate(formats strfmt.Registry) error

Validate validates this consent type

type Consents ¶

type Consents struct {

	// list of consents
	Consents []*Consent `json:"consents" yaml:"consents"`
}

Consents consents

swagger:model Consents

func (*Consents) ContextValidate ¶

func (m *Consents) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this consents based on the context it is used

func (*Consents) MarshalBinary ¶

func (m *Consents) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Consents) UnmarshalBinary ¶

func (m *Consents) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Consents) Validate ¶

func (m *Consents) Validate(formats strfmt.Registry) error

Validate validates this consents

type ContactPerson ¶

type ContactPerson struct {

	// company
	Company string `json:"Company,omitempty" yaml:"Company,omitempty"`

	// contact type
	ContactType string `json:"ContactType,omitempty" yaml:"ContactType,omitempty"`

	// email addresses
	EmailAddresses []string `json:"EmailAddresses" yaml:"EmailAddresses"`

	// given name
	GivenName string `json:"GivenName,omitempty" yaml:"GivenName,omitempty"`

	// sur name
	SurName string `json:"SurName,omitempty" yaml:"SurName,omitempty"`

	// telephone numbers
	TelephoneNumbers []string `json:"TelephoneNumbers" yaml:"TelephoneNumbers"`
}

ContactPerson ContactPerson represents the SAML element ContactPerson.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.3.2.2

swagger:model ContactPerson

func (*ContactPerson) ContextValidate ¶

func (m *ContactPerson) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this contact person based on context it is used

func (*ContactPerson) MarshalBinary ¶

func (m *ContactPerson) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ContactPerson) UnmarshalBinary ¶

func (m *ContactPerson) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ContactPerson) Validate ¶

func (m *ContactPerson) Validate(formats strfmt.Registry) error

Validate validates this contact person

type CreateClientAdminRequest ¶

type CreateClientAdminRequest struct {

	// The client application type.
	//
	// Client applications can be either of a `web` or `native` types.
	//
	// Web applications include clients like server web applications or service apps.
	//
	// Native applications include single-page applications (SPAs) and mobile or desktop
	// applications.
	//
	// Apply security measures according to the type of your application.
	// Example: web
	ApplicationType string `json:"application_type,omitempty" yaml:"application_type,omitempty"`

	// An array of dynamically calculated application types that can be used for filtering
	// Example: ["single_page","server_web","mobile_desktop","service","legacy","dcr"]
	// Read Only: true
	ApplicationTypes []string `json:"application_types" yaml:"application_types"`

	// Identity of the intended recipients (the audience).
	//
	// Typically, the audience is a single resource server or a list of resource servers.
	//
	// It is considered a good practice to limit the audience of the token for security purposes.
	Audience []string `json:"audience" yaml:"audience"`

	// Authorization details types
	//
	// Indicates what authorization details types the client can use.
	AuthorizationDetailsTypes []AuthorizationDetailType `json:"authorization_details_types" yaml:"authorization_details_types"`

	// Algorithm used for encrypting authorization responses.
	//
	// If both signing and encryption are requested, the response is first signed, and then encrypted.
	// As a result, a Nested JWT is obtained, as defined in JWT [RFC7519].
	//
	// If omitted, no encryption is applied by default.
	// Example: RSA-OAEP-256
	// Enum: [RSA-OAEP RSA-OAEP-256]
	AuthorizationEncryptedResponseAlg string `json:"authorization_encrypted_response_alg,omitempty" yaml:"authorization_encrypted_response_alg,omitempty"`

	// Algorithm used for encrypting authorization responses.
	//
	// With `authorization_encrypted_response_alg` specified, the default value is `A128CBC-HS256`.
	// When `authorization_encrypted_response_enc` is included, `authorization_encrypted_response_alg`
	// MUST also be provided in a request.
	// Example: A128CBC-HS256
	// Enum: [A256GCM A128CBC-HS256]
	AuthorizationEncryptedResponseEnc string `json:"authorization_encrypted_response_enc,omitempty" yaml:"authorization_encrypted_response_enc,omitempty"`

	// An authorization server (workspace) identifier holding the client application.
	// Example: default
	// Required: true
	AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"`

	// Algorithm used for signing authorization responses.
	//
	// With this parameter specified, the response is signed using JWS and according to the configured algorithm.
	//
	// `none` isn't allowed.
	// Example: RS256
	AuthorizationSignedResponseAlg string `json:"authorization_signed_response_alg,omitempty" yaml:"authorization_signed_response_alg,omitempty"`

	// OPTIONAL. The JWS alg algorithm value used by the client application to sign authentication requests.
	//
	// When omitted, the client application doesn't send signed authentication requests.
	BackchannelAuthenticationRequestSigningAlg string `` /* 127-byte string literal not displayed */

	// REQUIRED for requests when the client application uses CIBA as an authorization grant type, and the token
	// delivery mode is set to `ping` or `push`.
	//
	// This parameter is the endpoint where an OP (OpenID Provider) posts a notification after end-user authentication.
	//
	// Input: an HTTPS URL.
	BackchannelClientNotificationEndpoint string `json:"backchannel_client_notification_endpoint,omitempty" yaml:"backchannel_client_notification_endpoint,omitempty"`

	// REQUIRED for requests when the client application uses CIBA as an authorization grant type.
	//
	// Input: `poll`, `ping`, or `push`.
	BackchannelTokenDeliveryMode string `json:"backchannel_token_delivery_mode,omitempty" yaml:"backchannel_token_delivery_mode,omitempty"`

	// OPTIONAL. A boolean value indicating the `user_code` parameter support by the client application.
	//
	// If omitted, the default value is `false`.
	//
	// This applies only when the `backchannel_user_code_parameter_supported` OP parameter is `true`.
	BackchannelUserCodeParameter bool `json:"backchannel_user_code_parameter,omitempty" yaml:"backchannel_user_code_parameter,omitempty"`

	// OAuth client application identifier
	//
	// If not provided, a random client ID is generated.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// The client identifier time of issue.
	//
	// The value is the number of seconds between 1970-01-01T00:00:00Z (UTC) and the date/time of issue.
	ClientIDIssuedAt int64 `json:"client_id_issued_at,omitempty" yaml:"client_id_issued_at,omitempty"`

	// Human-readable name of a client application.
	// Example: My app
	ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"`

	// OAuth client secret
	//
	// If not provided, a random client secret is generated.
	// Min Length: 32
	ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"`

	// The client secret expiration time.
	//
	// If the client secret does not expire, `client_secret_expires_at` = `0`.
	ClientSecretExpiresAt int64 `json:"client_secret_expires_at,omitempty" yaml:"client_secret_expires_at,omitempty"`

	// Defines whether the client application is active or not.
	//
	// Only clients with the `Active` status can preform authorization, authentication, and PAR requests.
	// Enum: [active inactive]
	ClientStatus string `json:"client_status,omitempty" yaml:"client_status,omitempty"`

	// client type
	// Enum: [oauth2 saml]
	ClientType string `json:"client_type,omitempty" yaml:"client_type,omitempty"`

	// URI of a client application.
	ClientURI string `json:"client_uri,omitempty" yaml:"client_uri,omitempty"`

	// Date when the client application was created.
	// Example: 2022-04-07T19:17:31.323187Z
	// Format: date-time
	CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"`

	// Description of the client application.
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Optional developer owner of the client application.
	DeveloperID string `json:"developer_id,omitempty" yaml:"developer_id,omitempty"`

	// developer metadata
	DeveloperMetadata Metadata `json:"developer_metadata,omitempty" yaml:"developer_metadata,omitempty"`

	// Boolean value specifying whether the client always uses DPoP for token requests
	// If true, the authorization server will reject token requests from this client that do not contain the DPoP header.
	DpopBoundAccessTokens bool `json:"dpop_bound_access_tokens,omitempty" yaml:"dpop_bound_access_tokens,omitempty"`

	// fdx
	Fdx *FDXMetadata `json:"fdx,omitempty" yaml:"fdx,omitempty"`

	// An array of allowed OAuth client grant types.
	//
	// The `grantTypes` array stores OAuth flows that are allowed for a given client application.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-grant-types/grant-types-overview/) about grant types.
	// Example: ["password","refresh_token","client_credentials","implicit","authorization_code"]
	GrantTypes []string `json:"grant_types" yaml:"grant_types"`

	// An array of hashed rotated client secrets
	HashedRotatedSecrets []string `json:"hashed_rotated_secrets" yaml:"hashed_rotated_secrets"`

	// Hashed client secret
	//
	// Hashing client secrets provides additional security for your secrets storage as it hides
	// plaintext secrets from being viewed both in the UI and the database.
	HashedSecret string `json:"hashed_secret,omitempty" yaml:"hashed_secret,omitempty"`

	// JWE alg algorithm for encrypting the ID token issued to this client application.
	// Enum: [RSA-OAEP RSA-OAEP-256]
	IDTokenEncryptedResponseAlg string `json:"id_token_encrypted_response_alg,omitempty" yaml:"id_token_encrypted_response_alg,omitempty"`

	// JWE enc algorithm for encrypting the ID token issued to this client application.
	// Enum: [A256GCM A128CBC-HS256]
	IDTokenEncryptedResponseEnc string `json:"id_token_encrypted_response_enc,omitempty" yaml:"id_token_encrypted_response_enc,omitempty"`

	// Algorithm for signing ID tokens issued for a client application.
	//
	// The default value depends on authorization server configuration.
	// Example: ES256
	// Enum: [RS256 ES256 PS256]
	IDTokenSignedResponseAlg string `json:"id_token_signed_response_alg,omitempty" yaml:"id_token_signed_response_alg,omitempty"`

	// An introspection endpoint authentication method configured for the client application (read-only).
	//
	// If empty, the `token_endpoint_auth_method` is used.
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	IntrospectionEndpointAuthMethod string `json:"introspection_endpoint_auth_method,omitempty" yaml:"introspection_endpoint_auth_method,omitempty"`

	// jwks
	Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"`

	// A URL of JSON Web Key Set with the public keys used by a client application to authenticate to Cloudentity.
	JwksURI string `json:"jwks_uri,omitempty" yaml:"jwks_uri,omitempty"`

	// Logo URI.
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// metadata
	Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// External organization identifier. It is a unique string assigned by the CDR Register to identify an Accredited
	// Data Recipient Brand.
	//
	// The value obtained is used as the `aud` claim for message signing, for example, when a JSON Web Token (JWT) is
	// required for authorization, and represents the audience(s) the JWT is intended for.
	// Example: 5647fe90-f6bc-11eb-9a03-0242ac130003
	OrganisationID string `json:"organisation_id,omitempty" yaml:"organisation_id,omitempty"`

	// Policy URL to read about how the profile data is used.
	PolicyURI string `json:"policy_uri,omitempty" yaml:"policy_uri,omitempty"`

	// Array of URLs to which a relying party may request that the user be redirected after a logout has been performed.
	PostLogoutRedirectUris []string `json:"post_logout_redirect_uris" yaml:"post_logout_redirect_uris"`

	// privacy
	Privacy *ClientPrivacy `json:"privacy,omitempty" yaml:"privacy,omitempty"`

	// redirect uris
	RedirectUris RedirectURIs `json:"redirect_uris,omitempty" yaml:"redirect_uris,omitempty"`

	// Optional JWE alg algorithm the client is declaring that it may use for encrypting Request Objects
	// Example: RSA-OAEP
	// Enum: [RSA-OAEP RSA-OAEP-256]
	RequestObjectEncryptionAlg string `json:"request_object_encryption_alg,omitempty" yaml:"request_object_encryption_alg,omitempty"`

	// Optional JWE enc algorithm the client is declaring that it may use for encrypting Request Objects
	// When `request_object_encryption_enc` is included, `request_object_encryption_alg` MUST also be provided.
	// Example: A256GCM
	// Enum: [A256GCM A128CBC-HS256]
	RequestObjectEncryptionEnc string `json:"request_object_encryption_enc,omitempty" yaml:"request_object_encryption_enc,omitempty"`

	// Request object signing algorithm for the token endpoint
	//
	// Cloudentity supports signing tokens with the RS256, ES256, and PS256 algorithms. If you do not want
	// to use a signing algorithm, set the value of this parameter to `none`.
	// Example: none
	// Enum: [any none RS256 ES256 PS256]
	RequestObjectSigningAlg string `json:"request_object_signing_alg,omitempty" yaml:"request_object_signing_alg,omitempty"`

	// Array of absolute URIs that points to the Request Object that holds authorization request parameters.
	RequestUris []string `json:"request_uris" yaml:"request_uris"`

	// Boolean parameter indicating whether the only means of initiating an authorization request the client is allowed to use is PAR.
	RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"`

	// response types
	ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"`

	// A revocation endpoint authentication method configured for the client application (read-only).
	// If empty, the `token_endpoint_auth_method` is used.
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	RevocationEndpointAuthMethod string `json:"revocation_endpoint_auth_method,omitempty" yaml:"revocation_endpoint_auth_method,omitempty"`

	// An array of rotated OAuth client secrets
	RotatedSecrets []string `json:"rotated_secrets" yaml:"rotated_secrets"`

	// Space-separated list of scopes for compatibility with the OAuth specification.
	// Example: email offline_access openid
	Scope string `json:"scope,omitempty" yaml:"scope,omitempty"`

	// An array of string represented scopes assigned to a client application
	// Example: ["email","offline_access","openid"]
	Scopes []string `json:"scopes" yaml:"scopes"`

	// OPTIONAL. [A URL using the HTTPS scheme](https://openid.net/specs/openid-connect-registration-1_0.html#SectorIdentifierValidation).
	// It must reference a JSON file with the array of `redirect_uri` values.
	//
	// Pass this parameter when you use multiple domains in your `redirect_uris` or need a mechanism to allow changes in
	// domain without affecting consumer consent.
	//
	// [Read more](https://openid.net/specs/openid-connect-core-1_0.html)
	SectorIdentifierURI string `json:"sector_identifier_uri,omitempty" yaml:"sector_identifier_uri,omitempty"`

	// A digitally signed or MACed JSON Web Token (JWT) [RFC7519] that
	// asserts metadata values about the client software.  In some cases,
	// a software statement is issued directly by the client
	// developer.  In other cases, a software statement is issued by
	// a third-party organization for use by the client developer.
	//
	// In both cases, the trust relationship the authorization server has
	// with the issuer of the software statement is intended to be used
	// as an input to the evaluation of whether the registration request
	// is accepted.
	//
	// A software statement can be presented to an
	// authorization server as part of the client registration request.
	SoftwareStatement string `json:"software_statement,omitempty" yaml:"software_statement,omitempty"`

	// software statement payload
	SoftwareStatementPayload Metadata `json:"software_statement_payload,omitempty" yaml:"software_statement_payload,omitempty"`

	// Subject identifier type
	//
	// Stores information if the subject identifier is of the `public` or the `pairwise` type.
	//
	// Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer,
	// and are intended to be consumed by client applications. There are two types
	// of subject identifiers: `public` and `pairwise`.
	//
	// For the `public` type, the value of the `sub` (subject) token claim is the same for all clients.
	//
	// For the `pairwise` type, a different `sub` (subject) token claim is provided for each client.
	// Using the `pairwise` subject identifier makes it impossible for client applications to correlate the end-user's
	// activity without their permission.
	// Example: public
	// Enum: [public pairwise]
	SubjectType string `json:"subject_type,omitempty" yaml:"subject_type,omitempty"`

	// Defines whether the client application is a system tenant's application or not.
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// ID of a tenant where the client application is added
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// A string containing the value of an expected dNSName SAN entry in the certificate.
	TLSClientAuthSanDNS string `json:"tls_client_auth_san_dns,omitempty" yaml:"tls_client_auth_san_dns,omitempty"`

	// A string containing the value of an expected rfc822Name SAN entry in the certificate.
	TLSClientAuthSanEmail string `json:"tls_client_auth_san_email,omitempty" yaml:"tls_client_auth_san_email,omitempty"`

	// A string representation of an IP address in either dotted decimal notation (for IPv4) or colon-delimited hexadecimal (for IPv6, as defined in [RFC5952]) that is expected to be present as an iPAddress SAN entry in the certificate.
	TLSClientAuthSanIP string `json:"tls_client_auth_san_ip,omitempty" yaml:"tls_client_auth_san_ip,omitempty"`

	// A string containing the value of an expected uniformResourceIdentifier SAN entry in the certificate.
	TLSClientAuthSanURI string `json:"tls_client_auth_san_uri,omitempty" yaml:"tls_client_auth_san_uri,omitempty"`

	// An [RFC4514] string representation of the expected subject distinguished name of the certificate.
	TLSClientAuthSubjectDn string `json:"tls_client_auth_subject_dn,omitempty" yaml:"tls_client_auth_subject_dn,omitempty"`

	// Boolean value indicating server support for mutual TLS client certificate-bound access tokens. If omitted, the default value is "false".
	TLSClientCertificateBoundAccessTokens bool `json:"tls_client_certificate_bound_access_tokens,omitempty" yaml:"tls_client_certificate_bound_access_tokens,omitempty"`

	// Token endpoint authentication method configured for a client application
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// To learn more, go to the Authorization Basics > Client Authentication section of this guide.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	TokenEndpointAuthMethod string `json:"token_endpoint_auth_method,omitempty" yaml:"token_endpoint_auth_method,omitempty"`

	// Signing algorithm for the token endpoint
	//
	// This field is optional. If empty, a client can use any algorithm supported by the server (see `token_endpoint_auth_signing_alg_values_supported` in the well-known endpoing).
	//
	// If provided, depending on the server configuration, client can use of one: HS256, RS256, ES256, PS256 algorithms.
	//
	// If your token endpoint authentication is set to the `private_key_jwt` method, the
	// `token_endpoint_auth_signing_alg` parameter must be either RS256, ES256, or PS256.
	//
	// If your token endpoint authentication is set to the `client_secret_jwt` method,
	// the `token_endpoint_auth_signing_alg` parameter must be HS256.
	// Example: ES256
	// Enum: [RS256 ES256 PS256 HS256 ]
	TokenEndpointAuthSigningAlg string `json:"token_endpoint_auth_signing_alg,omitempty" yaml:"token_endpoint_auth_signing_alg,omitempty"`

	// token exchange
	TokenExchange *ClientTokenExchangeConfiguration `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"`

	// token ttls
	TokenTtls *TokenTTLs `json:"token_ttls,omitempty" yaml:"token_ttls,omitempty"`

	// Terms of Service URL.
	TosURI string `json:"tos_uri,omitempty" yaml:"tos_uri,omitempty"`

	// Defines whether the client application is trusted or not.
	//
	// For trusted clients, consent pages are skipped during the authorization process.
	Trusted bool `json:"trusted,omitempty" yaml:"trusted,omitempty"`

	// Date when the client application was updated.
	// Example: 2022-05-08T01:11:51.1262916Z
	// Format: date-time
	UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"`

	// If enabled the client application will be able to set its own token TTLs.
	UseCustomTokenTtls bool `json:"use_custom_token_ttls,omitempty" yaml:"use_custom_token_ttls,omitempty"`

	// JWS alg algorithm REQUIRED for signing UserInfo Responses.
	//
	// If specified, the response is a JWT serialized and signed with JWS.
	//
	// If omitted, then by default, UserInfo Response returns the Claims
	// as an UTF-8 encoded JSON object using the application/json content-type.
	// Example: none
	// Enum: [none RS256 ES256]
	UserinfoSignedResponseAlg string `json:"userinfo_signed_response_alg,omitempty" yaml:"userinfo_signed_response_alg,omitempty"`
}

CreateClientAdminRequest create client admin request

swagger:model CreateClientAdminRequest

func (*CreateClientAdminRequest) ContextValidate ¶

func (m *CreateClientAdminRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this create client admin request based on the context it is used

func (*CreateClientAdminRequest) MarshalBinary ¶

func (m *CreateClientAdminRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CreateClientAdminRequest) UnmarshalBinary ¶

func (m *CreateClientAdminRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CreateClientAdminRequest) Validate ¶

func (m *CreateClientAdminRequest) Validate(formats strfmt.Registry) error

Validate validates this create client admin request

type CreateGatewayRequest ¶

type CreateGatewayRequest struct {

	// if true a services is created automatically for each new discovered api group
	CreateAndBindServicesAutomatically bool `json:"create_and_bind_services_automatically,omitempty" yaml:"create_and_bind_services_automatically,omitempty"`

	// description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// gateway name
	// Example: Cloudentity Pyron
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// ServerID that this gateway should protect
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// gateway type, one of: pyron, aws, azure, istio, kong, apigeex, apigeeedge, standalone
	// Example: pyron
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

CreateGatewayRequest create gateway request

swagger:model CreateGatewayRequest

func (*CreateGatewayRequest) ContextValidate ¶

func (m *CreateGatewayRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this create gateway request based on context it is used

func (*CreateGatewayRequest) MarshalBinary ¶

func (m *CreateGatewayRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CreateGatewayRequest) UnmarshalBinary ¶

func (m *CreateGatewayRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CreateGatewayRequest) Validate ¶

func (m *CreateGatewayRequest) Validate(formats strfmt.Registry) error

Validate validates this create gateway request

type CreateOrganizationRequest ¶

type CreateOrganizationRequest struct {

	// Your organization's label color in a HEX format.
	// Example: #007FFF
	Color string `json:"color,omitempty" yaml:"color,omitempty"`

	// Display description of the organization
	// Example: Organization description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// An array of email domains configured for an organization for the purposes of IDP discovery
	Domains []string `json:"domains" yaml:"domains"`

	// Unique identifier of an organization
	//
	// If not provided, a random ID is generated.
	// Example: default
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// metadata
	Metadata *ServerMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// Display name of the organization
	// Example: default
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// The id of the parent workspace / organization
	ParentID string `json:"parent_id,omitempty" yaml:"parent_id,omitempty"`

	// If true this organization can be used as a template when creating a new ones.
	Template bool `json:"template,omitempty" yaml:"template,omitempty"`

	// The id of the organization template that should be used to create the new organization
	TemplateID string `json:"template_id,omitempty" yaml:"template_id,omitempty"`
}

CreateOrganizationRequest create organization request

swagger:model CreateOrganizationRequest

func (*CreateOrganizationRequest) ContextValidate ¶

func (m *CreateOrganizationRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this create organization request based on the context it is used

func (*CreateOrganizationRequest) MarshalBinary ¶

func (m *CreateOrganizationRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CreateOrganizationRequest) UnmarshalBinary ¶

func (m *CreateOrganizationRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CreateOrganizationRequest) Validate ¶

func (m *CreateOrganizationRequest) Validate(formats strfmt.Registry) error

Validate validates this create organization request

type CredentialPayload ¶

type CredentialPayload struct {

	// credential id
	CredentialID string `json:"credential_id,omitempty" yaml:"credential_id,omitempty"`

	// user id
	UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"`
}

CredentialPayload credential payload

swagger:model CredentialPayload

func (*CredentialPayload) ContextValidate ¶

func (m *CredentialPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this credential payload based on context it is used

func (*CredentialPayload) MarshalBinary ¶

func (m *CredentialPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CredentialPayload) UnmarshalBinary ¶

func (m *CredentialPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CredentialPayload) Validate ¶

func (m *CredentialPayload) Validate(formats strfmt.Registry) error

Validate validates this credential payload

type CrossTenantAPIPolicyBinding ¶

type CrossTenantAPIPolicyBinding struct {

	// api id
	APIID string `json:"api_id,omitempty" yaml:"api_id,omitempty"`

	// api tenant id
	// Example: system
	APITenantID string `json:"api_tenant_id,omitempty" yaml:"api_tenant_id,omitempty"`

	// policy id
	PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"`

	// policy server id
	// Example: default
	PolicyServerID string `json:"policy_server_id,omitempty" yaml:"policy_server_id,omitempty"`

	// policy tenant id
	// Example: default
	PolicyTenantID string `json:"policy_tenant_id,omitempty" yaml:"policy_tenant_id,omitempty"`
}

CrossTenantAPIPolicyBinding cross tenant API policy binding

swagger:model CrossTenantAPIPolicyBinding

func (*CrossTenantAPIPolicyBinding) ContextValidate ¶

func (m *CrossTenantAPIPolicyBinding) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this cross tenant API policy binding based on context it is used

func (*CrossTenantAPIPolicyBinding) MarshalBinary ¶

func (m *CrossTenantAPIPolicyBinding) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CrossTenantAPIPolicyBinding) UnmarshalBinary ¶

func (m *CrossTenantAPIPolicyBinding) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CrossTenantAPIPolicyBinding) Validate ¶

func (m *CrossTenantAPIPolicyBinding) Validate(formats strfmt.Registry) error

Validate validates this cross tenant API policy binding

type Cursor ¶

type Cursor string

Cursor cursor

swagger:model Cursor

func (Cursor) ContextValidate ¶

func (m Cursor) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this cursor based on context it is used

func (Cursor) Validate ¶

func (m Cursor) Validate(formats strfmt.Registry) error

Validate validates this cursor

type CustomApp ¶

type CustomApp struct {

	// ClientID used for the CustomApp
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// ID of the CustomApp
	// Required: true
	ID string `json:"id" yaml:"id"`

	// Name of the CustomApp
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// ID of the server
	// Required: true
	ServerID string `json:"server_id" yaml:"server_id"`

	// ID of the tenant
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// Type of the custom app
	// Example: post-authn
	// Enum: [post-authn]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// url of the CustomApp
	// Required: true
	URL string `json:"url" yaml:"url"`
}

CustomApp Custom Branding CustomApp

swagger:model CustomApp

func (*CustomApp) ContextValidate ¶

func (m *CustomApp) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this custom app based on context it is used

func (*CustomApp) MarshalBinary ¶

func (m *CustomApp) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CustomApp) UnmarshalBinary ¶

func (m *CustomApp) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CustomApp) Validate ¶

func (m *CustomApp) Validate(formats strfmt.Registry) error

Validate validates this custom app

type CustomAppResponse ¶

type CustomAppResponse struct {

	// client
	Client *ClientAdminResponse `json:"client,omitempty" yaml:"client,omitempty"`

	// ClientID used for the CustomApp
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// ID of the CustomApp
	// Required: true
	ID string `json:"id" yaml:"id"`

	// Name of the CustomApp
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// ID of the server
	// Required: true
	ServerID string `json:"server_id" yaml:"server_id"`

	// ID of the tenant
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// Type of the custom app
	// Example: post-authn
	// Enum: [post-authn]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// url of the CustomApp
	// Required: true
	URL string `json:"url" yaml:"url"`
}

CustomAppResponse CustomApp object on list or get

swagger:model CustomAppResponse

func (*CustomAppResponse) ContextValidate ¶

func (m *CustomAppResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this custom app response based on the context it is used

func (*CustomAppResponse) MarshalBinary ¶

func (m *CustomAppResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CustomAppResponse) UnmarshalBinary ¶

func (m *CustomAppResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CustomAppResponse) Validate ¶

func (m *CustomAppResponse) Validate(formats strfmt.Registry) error

Validate validates this custom app response

type CustomAppsResponse ¶

type CustomAppsResponse struct {

	// list of CustomApps
	// in:body
	CustomApps []*CustomApp `json:"custom_apps" yaml:"custom_apps"`

	// The ETag HTTP header is an identifier for a specific version of a resource
	//
	// in:header
	Etag string `json:"etag,omitempty" yaml:"etag,omitempty"`
}

CustomAppsResponse CustomApps

swagger:model CustomAppsResponse

func (*CustomAppsResponse) ContextValidate ¶

func (m *CustomAppsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this custom apps response based on the context it is used

func (*CustomAppsResponse) MarshalBinary ¶

func (m *CustomAppsResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CustomAppsResponse) UnmarshalBinary ¶

func (m *CustomAppsResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CustomAppsResponse) Validate ¶

func (m *CustomAppsResponse) Validate(formats strfmt.Registry) error

Validate validates this custom apps response

type CustomCredentials ¶

type CustomCredentials interface{}

CustomCredentials Custom IDP specific credentials

swagger:model CustomCredentials

type CustomIDP ¶

type CustomIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// credentials
	Credentials CustomCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// settings
	Settings *CustomSettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

CustomIDP custom ID p

swagger:model CustomIDP

func (*CustomIDP) ContextValidate ¶

func (m *CustomIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this custom ID p based on the context it is used

func (*CustomIDP) MarshalBinary ¶

func (m *CustomIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CustomIDP) UnmarshalBinary ¶

func (m *CustomIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CustomIDP) Validate ¶

func (m *CustomIDP) Validate(formats strfmt.Registry) error

Validate validates this custom ID p

type CustomServerConsent ¶

type CustomServerConsent struct {

	// Deprecetad scope_grant_url. Use server_consent_url instead
	ScopeGrantURL string `json:"scope_grant_url,omitempty" yaml:"scope_grant_url,omitempty"`

	// server consent url
	ServerConsentURL string `json:"server_consent_url,omitempty" yaml:"server_consent_url,omitempty"`
}

CustomServerConsent custom server consent

swagger:model CustomServerConsent

func (*CustomServerConsent) ContextValidate ¶

func (m *CustomServerConsent) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this custom server consent based on context it is used

func (*CustomServerConsent) MarshalBinary ¶

func (m *CustomServerConsent) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CustomServerConsent) UnmarshalBinary ¶

func (m *CustomServerConsent) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CustomServerConsent) Validate ¶

func (m *CustomServerConsent) Validate(formats strfmt.Registry) error

Validate validates this custom server consent

type CustomSettings ¶

type CustomSettings struct {

	// URL to your custom login page
	// Example: https://example.com/login
	LoginURL string `json:"login_url,omitempty" yaml:"login_url,omitempty"`

	// Type metadata
	//
	// There are two type metadatas: `generic` and `cloudentity`. If you choose `cloudentity` and do
	// not provide authentication context attributes, it defaults to using the attributes from
	// Cloudentity Cloud Identity Plane (CIP).
	//
	// If not provided, the `generic` type is set.
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

CustomSettings Custom IDP specific settings

swagger:model CustomSettings

func (*CustomSettings) ContextValidate ¶

func (m *CustomSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this custom settings based on context it is used

func (*CustomSettings) MarshalBinary ¶

func (m *CustomSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CustomSettings) UnmarshalBinary ¶

func (m *CustomSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CustomSettings) Validate ¶

func (m *CustomSettings) Validate(formats strfmt.Registry) error

Validate validates this custom settings

type CustomerConsentsAuditEventPayload ¶

type CustomerConsentsAuditEventPayload struct {

	// customer id
	CustomerID string `json:"customer_id,omitempty" yaml:"customer_id,omitempty"`

	// number of consents revoked
	NumberRevoked int64 `json:"number_revoked,omitempty" yaml:"number_revoked,omitempty"`
}

CustomerConsentsAuditEventPayload customer consents audit event payload

swagger:model CustomerConsentsAuditEventPayload

func (*CustomerConsentsAuditEventPayload) ContextValidate ¶

func (m *CustomerConsentsAuditEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this customer consents audit event payload based on context it is used

func (*CustomerConsentsAuditEventPayload) MarshalBinary ¶

func (m *CustomerConsentsAuditEventPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*CustomerConsentsAuditEventPayload) UnmarshalBinary ¶

func (m *CustomerConsentsAuditEventPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*CustomerConsentsAuditEventPayload) Validate ¶

Validate validates this customer consents audit event payload

type DCRCreatedEventPayload ¶

type DCRCreatedEventPayload struct {

	// client details
	ClientDetails *DCRDetails `json:"client_details,omitempty" yaml:"client_details,omitempty"`

	// Requester IP address obtained from system network socket information.
	RemoteAddr string `json:"remote_addr,omitempty" yaml:"remote_addr,omitempty"`

	// Requester IP address obtained from True-Client-IP header.
	TrueClientIP string `json:"true_client_ip,omitempty" yaml:"true_client_ip,omitempty"`

	// A characteristic string that lets servers and network peers identify the application, operating system, vendor, and/or version of the requesting user agent.
	UserAgent string `json:"user_agent,omitempty" yaml:"user_agent,omitempty"`

	// Requester IP address obtained from X-Forwarded-For header.
	XForwardedFor string `json:"x_forwarded_for,omitempty" yaml:"x_forwarded_for,omitempty"`

	// Requester IP address obtained from X-Real-IP header.
	XRealIP string `json:"x_real_ip,omitempty" yaml:"x_real_ip,omitempty"`
}

DCRCreatedEventPayload d c r created event payload

swagger:model DCRCreatedEventPayload

func (*DCRCreatedEventPayload) ContextValidate ¶

func (m *DCRCreatedEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this d c r created event payload based on the context it is used

func (*DCRCreatedEventPayload) MarshalBinary ¶

func (m *DCRCreatedEventPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*DCRCreatedEventPayload) UnmarshalBinary ¶

func (m *DCRCreatedEventPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*DCRCreatedEventPayload) Validate ¶

func (m *DCRCreatedEventPayload) Validate(formats strfmt.Registry) error

Validate validates this d c r created event payload

type DCRDetails ¶

type DCRDetails struct {

	// certificate bound access token
	CertificateBoundAccessToken bool `json:"certificate_bound_access_token,omitempty" yaml:"certificate_bound_access_token,omitempty"`

	// client id
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// client name
	ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"`

	// grant types
	GrantTypes []string `json:"grant_types" yaml:"grant_types"`

	// scopes
	Scopes []string `json:"scopes" yaml:"scopes"`

	// software statement provided
	SoftwareStatementProvided bool `json:"software_statement_provided,omitempty" yaml:"software_statement_provided,omitempty"`

	// token endpoint auth method
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	TokenEndpointAuthMethod string `json:"token_endpoint_auth_method,omitempty" yaml:"token_endpoint_auth_method,omitempty"`
}

DCRDetails d c r details

swagger:model DCRDetails

func (*DCRDetails) ContextValidate ¶

func (m *DCRDetails) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this d c r details based on context it is used

func (*DCRDetails) MarshalBinary ¶

func (m *DCRDetails) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*DCRDetails) UnmarshalBinary ¶

func (m *DCRDetails) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*DCRDetails) Validate ¶

func (m *DCRDetails) Validate(formats strfmt.Registry) error

Validate validates this d c r details

type DCRRejectedEventPayload ¶

type DCRRejectedEventPayload struct {

	// High level error name (request_forbidden, access_denied, invalid_request).
	Error string `json:"error,omitempty" yaml:"error,omitempty"`

	// Error root cause (invalid_pkce, invalid_state, user_policy_failed).
	ErrorCause string `json:"error_cause,omitempty" yaml:"error_cause,omitempty"`

	// Human readable error description
	ErrorDescription string `json:"error_description,omitempty" yaml:"error_description,omitempty"`

	// Error hint
	ErrorHint string `json:"error_hint,omitempty" yaml:"error_hint,omitempty"`

	// External error
	ExternalError bool `json:"external_error,omitempty" yaml:"external_error,omitempty"`

	// Requester IP address obtained from system network socket information.
	RemoteAddr string `json:"remote_addr,omitempty" yaml:"remote_addr,omitempty"`

	// Requester IP address obtained from True-Client-IP header.
	TrueClientIP string `json:"true_client_ip,omitempty" yaml:"true_client_ip,omitempty"`

	// A characteristic string that lets servers and network peers identify the application, operating system, vendor, and/or version of the requesting user agent.
	UserAgent string `json:"user_agent,omitempty" yaml:"user_agent,omitempty"`

	// Requester IP address obtained from X-Forwarded-For header.
	XForwardedFor string `json:"x_forwarded_for,omitempty" yaml:"x_forwarded_for,omitempty"`

	// Requester IP address obtained from X-Real-IP header.
	XRealIP string `json:"x_real_ip,omitempty" yaml:"x_real_ip,omitempty"`
}

DCRRejectedEventPayload d c r rejected event payload

swagger:model DCRRejectedEventPayload

func (*DCRRejectedEventPayload) ContextValidate ¶

func (m *DCRRejectedEventPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this d c r rejected event payload based on context it is used

func (*DCRRejectedEventPayload) MarshalBinary ¶

func (m *DCRRejectedEventPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*DCRRejectedEventPayload) UnmarshalBinary ¶

func (m *DCRRejectedEventPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*DCRRejectedEventPayload) Validate ¶

func (m *DCRRejectedEventPayload) Validate(formats strfmt.Registry) error

Validate validates this d c r rejected event payload

type DefaultBruteForceLimit ¶

type DefaultBruteForceLimit struct {

	// duration until retry permitted in minutes
	// Format: duration
	BlockDuration strfmt.Duration `json:"block_duration,omitempty" yaml:"block_duration,omitempty"`

	// number of attempts before blocked
	MaxAttempts int64 `json:"max_attempts,omitempty" yaml:"max_attempts,omitempty"`
}

DefaultBruteForceLimit default brute force limit

swagger:model DefaultBruteForceLimit

func (*DefaultBruteForceLimit) ContextValidate ¶

func (m *DefaultBruteForceLimit) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this default brute force limit based on context it is used

func (*DefaultBruteForceLimit) MarshalBinary ¶

func (m *DefaultBruteForceLimit) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*DefaultBruteForceLimit) UnmarshalBinary ¶

func (m *DefaultBruteForceLimit) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*DefaultBruteForceLimit) Validate ¶

func (m *DefaultBruteForceLimit) Validate(formats strfmt.Registry) error

Validate validates this default brute force limit

type DefaultBruteForceLimits ¶

type DefaultBruteForceLimits struct {

	// client authentication
	ClientAuthentication *DefaultBruteForceLimit `json:"client_authentication,omitempty" yaml:"client_authentication,omitempty"`

	// device handling
	DeviceHandling *DefaultBruteForceLimit `json:"device_handling,omitempty" yaml:"device_handling,omitempty"`

	// enabled
	Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"`

	// identity activate self registered
	IdentityActivateSelfRegistered *DefaultBruteForceLimit `json:"identity_activate_self_registered,omitempty" yaml:"identity_activate_self_registered,omitempty"`

	// identity activate with extended code
	IdentityActivateWithExtendedCode *DefaultBruteForceLimit `json:"identity_activate_with_extended_code,omitempty" yaml:"identity_activate_with_extended_code,omitempty"`

	// identity address verification
	IdentityAddressVerification *DefaultBruteForceLimit `json:"identity_address_verification,omitempty" yaml:"identity_address_verification,omitempty"`

	// identity authentication
	IdentityAuthentication *DefaultBruteForceLimit `json:"identity_authentication,omitempty" yaml:"identity_authentication,omitempty"`

	// identity change password
	IdentityChangePassword *DefaultBruteForceLimit `json:"identity_change_password,omitempty" yaml:"identity_change_password,omitempty"`

	// identity code inspect
	IdentityCodeInspect *DefaultBruteForceLimit `json:"identity_code_inspect,omitempty" yaml:"identity_code_inspect,omitempty"`

	// identity code verify
	IdentityCodeVerify *DefaultBruteForceLimit `json:"identity_code_verify,omitempty" yaml:"identity_code_verify,omitempty"`

	// identity confirm password
	IdentityConfirmPassword *DefaultBruteForceLimit `json:"identity_confirm_password,omitempty" yaml:"identity_confirm_password,omitempty"`

	// identity registration
	IdentityRegistration *DefaultBruteForceLimit `json:"identity_registration,omitempty" yaml:"identity_registration,omitempty"`

	// identity self activation
	IdentitySelfActivation *DefaultBruteForceLimit `json:"identity_self_activation,omitempty" yaml:"identity_self_activation,omitempty"`

	// identity self change password
	IdentitySelfChangePassword *DefaultBruteForceLimit `json:"identity_self_change_password,omitempty" yaml:"identity_self_change_password,omitempty"`

	// identity self register
	IdentitySelfRegister *DefaultBruteForceLimit `json:"identity_self_register,omitempty" yaml:"identity_self_register,omitempty"`

	// identity set credential
	IdentitySetCredential *DefaultBruteForceLimit `json:"identity_set_credential,omitempty" yaml:"identity_set_credential,omitempty"`

	// identity verify password
	IdentityVerifyPassword *DefaultBruteForceLimit `json:"identity_verify_password,omitempty" yaml:"identity_verify_password,omitempty"`

	// mfa
	Mfa *DefaultBruteForceLimit `json:"mfa,omitempty" yaml:"mfa,omitempty"`
}

DefaultBruteForceLimits default brute force limits

swagger:model DefaultBruteForceLimits

func (*DefaultBruteForceLimits) ContextValidate ¶

func (m *DefaultBruteForceLimits) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this default brute force limits based on the context it is used

func (*DefaultBruteForceLimits) MarshalBinary ¶

func (m *DefaultBruteForceLimits) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*DefaultBruteForceLimits) UnmarshalBinary ¶

func (m *DefaultBruteForceLimits) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*DefaultBruteForceLimits) Validate ¶

func (m *DefaultBruteForceLimits) Validate(formats strfmt.Registry) error

Validate validates this default brute force limits

type DefaultEmailSettings ¶

type DefaultEmailSettings struct {

	// from
	From string `json:"from,omitempty" yaml:"from,omitempty"`

	// message subject
	MessageSubject string `json:"message_subject,omitempty" yaml:"message_subject,omitempty"`

	// message template
	MessageTemplate string `json:"message_template,omitempty" yaml:"message_template,omitempty"`
}

DefaultEmailSettings default email settings

swagger:model DefaultEmailSettings

func (*DefaultEmailSettings) ContextValidate ¶

func (m *DefaultEmailSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this default email settings based on context it is used

func (*DefaultEmailSettings) MarshalBinary ¶

func (m *DefaultEmailSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*DefaultEmailSettings) UnmarshalBinary ¶

func (m *DefaultEmailSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*DefaultEmailSettings) Validate ¶

func (m *DefaultEmailSettings) Validate(formats strfmt.Registry) error

Validate validates this default email settings

type DefaultSMSSettings ¶

type DefaultSMSSettings struct {

	// message template
	MessageTemplate string `json:"message_template,omitempty" yaml:"message_template,omitempty"`

	// source
	Source string `json:"source,omitempty" yaml:"source,omitempty"`
}

DefaultSMSSettings default s m s settings

swagger:model DefaultSMSSettings

func (*DefaultSMSSettings) ContextValidate ¶

func (m *DefaultSMSSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this default s m s settings based on context it is used

func (*DefaultSMSSettings) MarshalBinary ¶

func (m *DefaultSMSSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*DefaultSMSSettings) UnmarshalBinary ¶

func (m *DefaultSMSSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*DefaultSMSSettings) Validate ¶

func (m *DefaultSMSSettings) Validate(formats strfmt.Registry) error

Validate validates this default s m s settings

type DeviceAuthorizationConfiguration ¶

type DeviceAuthorizationConfiguration struct {

	// Custom device authorization request TTL
	// If not provided, TTL is set to 30 minutes
	// Format: duration
	RequestTTL strfmt.Duration `json:"request_ttl,omitempty" yaml:"request_ttl,omitempty"`

	// user code character set
	UserCodeCharacterSet UserCodeCharacterSet `json:"user_code_character_set,omitempty" yaml:"user_code_character_set,omitempty"`

	// user code length
	UserCodeLength int64 `json:"user_code_length,omitempty" yaml:"user_code_length,omitempty"`
}

DeviceAuthorizationConfiguration device authorization configuration

swagger:model DeviceAuthorizationConfiguration

func (*DeviceAuthorizationConfiguration) ContextValidate ¶

func (m *DeviceAuthorizationConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this device authorization configuration based on the context it is used

func (*DeviceAuthorizationConfiguration) MarshalBinary ¶

func (m *DeviceAuthorizationConfiguration) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*DeviceAuthorizationConfiguration) UnmarshalBinary ¶

func (m *DeviceAuthorizationConfiguration) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*DeviceAuthorizationConfiguration) Validate ¶

Validate validates this device authorization configuration

type Duration ¶

type Duration int64

Duration A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years.

swagger:model Duration

func (Duration) ContextValidate ¶

func (m Duration) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this duration based on context it is used

func (Duration) Validate ¶

func (m Duration) Validate(formats strfmt.Registry) error

Validate validates this duration

type DurationType ¶

type DurationType string

DurationType duration type

swagger:model DurationType

func (DurationType) ContextValidate ¶

func (m DurationType) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this duration type based on context it is used

func (DurationType) Validate ¶

func (m DurationType) Validate(formats strfmt.Registry) error

Validate validates this duration type

type DynamicClientRegistrationSettings ¶

type DynamicClientRegistrationSettings struct {

	// Binds registration token to the certificate used to register client
	CertBoundRegistrationToken bool `json:"cert_bound_registration_token,omitempty" yaml:"cert_bound_registration_token,omitempty"`

	// An optional list of scopes to be granted to a client when no scopes are provided in the DCR registration request
	//
	// If not provided, the following default scopes are granted for the client application: openid, address, email, phone, profile.
	DefaultScopes []string `json:"default_scopes" yaml:"default_scopes"`

	// Disable registration access token expiry
	//
	// If is flag is on, the registration access token will never expire.
	DisableRegistrationAccessTokenExpiry bool `json:"disable_registration_access_token_expiry,omitempty" yaml:"disable_registration_access_token_expiry,omitempty"`

	// Disables client management using registration token
	//
	// If disabled, client can manage itself using access token issued by client credentials flow.
	DisableRegistrationTokenManagement bool `json:"disable_registration_token_management,omitempty" yaml:"disable_registration_token_management,omitempty"`

	// Disables registration token rotation
	DisableRegistrationTokenRotation bool `json:"disable_registration_token_rotation,omitempty" yaml:"disable_registration_token_rotation,omitempty"`

	// Enables dynamic client registration
	Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"`

	// initial access token
	InitialAccessToken *InitialAccessTokenSettings `json:"initial_access_token,omitempty" yaml:"initial_access_token,omitempty"`

	// payload
	Payload *PayloadSettings `json:"payload,omitempty" yaml:"payload,omitempty"`

	// Registration access token TTL
	//
	// Time to live of the registration access token (default 30 days).
	// The minimum value is 24 hours.
	// Example: 720h0m0s
	// Format: duration
	RegistrationAccessTokenTTL strfmt.Duration `json:"registration_access_token_ttl,omitempty" yaml:"registration_access_token_ttl,omitempty"`
}

DynamicClientRegistrationSettings dynamic client registration settings

swagger:model DynamicClientRegistrationSettings

func (*DynamicClientRegistrationSettings) ContextValidate ¶

func (m *DynamicClientRegistrationSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this dynamic client registration settings based on the context it is used

func (*DynamicClientRegistrationSettings) MarshalBinary ¶

func (m *DynamicClientRegistrationSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*DynamicClientRegistrationSettings) UnmarshalBinary ¶

func (m *DynamicClientRegistrationSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*DynamicClientRegistrationSettings) Validate ¶

Validate validates this dynamic client registration settings

type Element ¶

type Element struct {

	// attr
	Attr []*Attr `json:"Attr" yaml:"Attr"`

	// child
	Child []*Token `json:"Child" yaml:"Child"`

	// space
	Space string `json:"Space,omitempty" yaml:"Space,omitempty"`
}

Element An Element represents an XML element, its attributes, and its child tokens.

swagger:model Element

func (*Element) ContextValidate ¶

func (m *Element) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this element based on the context it is used

func (*Element) MarshalBinary ¶

func (m *Element) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Element) UnmarshalBinary ¶

func (m *Element) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Element) Validate ¶

func (m *Element) Validate(formats strfmt.Registry) error

Validate validates this element

type EmailAuth ¶

type EmailAuth struct {

	// SMTP auth mechanism: crammd5 or plain
	// Example: plain
	// Required: true
	Auth string `json:"auth" yaml:"auth"`

	// The host of the SMTP server.
	// Required: true
	Host string `json:"host" yaml:"host"`

	// Password which is used to authenticate to the SMTP server.
	// Required: true
	Password string `json:"password" yaml:"password"`

	// The port of the SMTP server.
	// Example: 25
	// Required: true
	Port int64 `json:"port" yaml:"port"`

	// Username which is used to authenticate to the SMTP server.
	// Required: true
	Username string `json:"username" yaml:"username"`
}

EmailAuth email auth

swagger:model EmailAuth

func (*EmailAuth) ContextValidate ¶

func (m *EmailAuth) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this email auth based on context it is used

func (*EmailAuth) MarshalBinary ¶

func (m *EmailAuth) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*EmailAuth) UnmarshalBinary ¶

func (m *EmailAuth) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*EmailAuth) Validate ¶

func (m *EmailAuth) Validate(formats strfmt.Registry) error

Validate validates this email auth

type EmailSettings ¶

type EmailSettings struct {

	// Custom email From address.
	//
	// If not set, the default is used.
	// Example: noreply@cloudentity.com
	CustomFrom string `json:"custom_from,omitempty" yaml:"custom_from,omitempty"`

	// Custom email subject.
	//
	// If not set, the default is used.
	CustomMessageSubject string `json:"custom_message_subject,omitempty" yaml:"custom_message_subject,omitempty"`

	// Custom email template.
	//
	// If not set, the default is used.
	CustomMessageTemplate string `json:"custom_message_template,omitempty" yaml:"custom_message_template,omitempty"`

	// otp
	Otp *OTPConfiguration `json:"otp,omitempty" yaml:"otp,omitempty"`

	// Email provider.
	// Example: embedded
	// Enum: [smtp embedded]
	Provider string `json:"provider,omitempty" yaml:"provider,omitempty"`
}

EmailSettings email settings

swagger:model EmailSettings

func (*EmailSettings) ContextValidate ¶

func (m *EmailSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this email settings based on the context it is used

func (*EmailSettings) MarshalBinary ¶

func (m *EmailSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*EmailSettings) UnmarshalBinary ¶

func (m *EmailSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*EmailSettings) Validate ¶

func (m *EmailSettings) Validate(formats strfmt.Registry) error

Validate validates this email settings

type EncryptionMethod ¶

type EncryptionMethod struct {

	// algorithm
	Algorithm string `json:"Algorithm,omitempty" yaml:"Algorithm,omitempty"`
}

EncryptionMethod EncryptionMethod represents the XMLSEC object of the same name

swagger:model EncryptionMethod

func (*EncryptionMethod) ContextValidate ¶

func (m *EncryptionMethod) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this encryption method based on context it is used

func (*EncryptionMethod) MarshalBinary ¶

func (m *EncryptionMethod) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*EncryptionMethod) UnmarshalBinary ¶

func (m *EncryptionMethod) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*EncryptionMethod) Validate ¶

func (m *EncryptionMethod) Validate(formats strfmt.Registry) error

Validate validates this encryption method

type Endpoint ¶

type Endpoint struct {

	// binding
	Binding string `json:"Binding,omitempty" yaml:"Binding,omitempty"`

	// location
	Location string `json:"Location,omitempty" yaml:"Location,omitempty"`

	// response location
	ResponseLocation string `json:"ResponseLocation,omitempty" yaml:"ResponseLocation,omitempty"`
}

Endpoint Endpoint represents the SAML EndpointType object.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.2.2

swagger:model Endpoint

func (*Endpoint) ContextValidate ¶

func (m *Endpoint) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this endpoint based on context it is used

func (*Endpoint) MarshalBinary ¶

func (m *Endpoint) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Endpoint) UnmarshalBinary ¶

func (m *Endpoint) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Endpoint) Validate ¶

func (m *Endpoint) Validate(formats strfmt.Registry) error

Validate validates this endpoint

type EntityDescriptor ¶

type EntityDescriptor struct {

	// additional metadata locations
	AdditionalMetadataLocations []string `json:"AdditionalMetadataLocations" yaml:"AdditionalMetadataLocations"`

	// affiliation descriptor
	AffiliationDescriptor *AffiliationDescriptor `json:"AffiliationDescriptor,omitempty" yaml:"AffiliationDescriptor,omitempty"`

	// attribute authority descriptors
	AttributeAuthorityDescriptors []*AttributeAuthorityDescriptor `json:"AttributeAuthorityDescriptors" yaml:"AttributeAuthorityDescriptors"`

	// authn authority descriptors
	AuthnAuthorityDescriptors []*AuthnAuthorityDescriptor `json:"AuthnAuthorityDescriptors" yaml:"AuthnAuthorityDescriptors"`

	// cache duration
	CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"`

	// contact person
	ContactPerson *ContactPerson `json:"ContactPerson,omitempty" yaml:"ContactPerson,omitempty"`

	// entity ID
	EntityID string `json:"EntityID,omitempty" yaml:"EntityID,omitempty"`

	// ID
	ID string `json:"ID,omitempty" yaml:"ID,omitempty"`

	// ID p s s o descriptors
	IDPSSODescriptors []*IDPSSODescriptor `json:"IDPSSODescriptors" yaml:"IDPSSODescriptors"`

	// organization
	Organization *Organization `json:"Organization,omitempty" yaml:"Organization,omitempty"`

	// p d p descriptors
	PDPDescriptors []*PDPDescriptor `json:"PDPDescriptors" yaml:"PDPDescriptors"`

	// role descriptors
	RoleDescriptors []*RoleDescriptor `json:"RoleDescriptors" yaml:"RoleDescriptors"`

	// s p s s o descriptors
	SPSSODescriptors []*SPSSODescriptor `json:"SPSSODescriptors" yaml:"SPSSODescriptors"`

	// signature
	Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"`

	// valid until
	// Format: date-time
	ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"`

	// XML name
	XMLName *Name `json:"XMLName,omitempty" yaml:"XMLName,omitempty"`
}

EntityDescriptor EntityDescriptor represents the SAML EntityDescriptor object.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.3.2

swagger:model EntityDescriptor

func (*EntityDescriptor) ContextValidate ¶

func (m *EntityDescriptor) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this entity descriptor based on the context it is used

func (*EntityDescriptor) MarshalBinary ¶

func (m *EntityDescriptor) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*EntityDescriptor) UnmarshalBinary ¶

func (m *EntityDescriptor) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*EntityDescriptor) Validate ¶

func (m *EntityDescriptor) Validate(formats strfmt.Registry) error

Validate validates this entity descriptor

type Environment ¶

type Environment struct {

	// add fake tenantUrl to query params for routing other than default (needed for backward compatibility with CIP for vanity domains)
	AddFakeTenantURLToLoginRequestForNonDefaultRouting bool `` /* 155-byte string literal not displayed */

	// admin issuer url
	AdminIssuerURL string `json:"admin_issuer_url,omitempty" yaml:"admin_issuer_url,omitempty"`

	// admin portal face lifting
	AdminPortalFaceLifting bool `json:"admin_portal_face_lifting,omitempty" yaml:"admin_portal_face_lifting,omitempty"`

	// admin workspace access
	AdminWorkspaceAccess bool `json:"admin_workspace_access,omitempty" yaml:"admin_workspace_access,omitempty"`

	// analytics duration
	// Format: duration
	AnalyticsDuration strfmt.Duration `json:"analytics_duration,omitempty" yaml:"analytics_duration,omitempty"`

	// audit events duration
	// Format: duration
	AuditEventsDuration strfmt.Duration `json:"audit_events_duration,omitempty" yaml:"audit_events_duration,omitempty"`

	// block access to a tenant's resources from traffic not originating from the tenant's vanity domain
	BlockNonVanityDomainAccess bool `json:"block_non_vanity_domain_access,omitempty" yaml:"block_non_vanity_domain_access,omitempty"`

	// brute force limits
	BruteForceLimits *DefaultBruteForceLimits `json:"brute_force_limits,omitempty" yaml:"brute_force_limits,omitempty"`

	// cache access tokens
	CacheAccessTokens bool `json:"cache_access_tokens,omitempty" yaml:"cache_access_tokens,omitempty"`

	// arrangement cache for CDR
	CdrArrangementCache bool `json:"cdr_arrangement_cache,omitempty" yaml:"cdr_arrangement_cache,omitempty"`

	// disable unique software id for CDR
	CdrDisableUniqueSoftwareID bool `json:"cdr_disable_unique_software_id,omitempty" yaml:"cdr_disable_unique_software_id,omitempty"`

	// stores client secrets as one-way hashes
	ClientSecretsStoredAsOneWayHash bool `json:"client_secrets_stored_as_one_way_hash,omitempty" yaml:"client_secrets_stored_as_one_way_hash,omitempty"`

	// Cloudentity IDP
	CloudentityIdp bool `json:"cloudentity_idp,omitempty" yaml:"cloudentity_idp,omitempty"`

	// commit
	Commit string `json:"commit,omitempty" yaml:"commit,omitempty"`

	// connectID profile
	ConnectID bool `json:"connect_id,omitempty" yaml:"connect_id,omitempty"`

	// enable additional debug logs
	Debug bool `json:"debug,omitempty" yaml:"debug,omitempty"`

	// allow the usage of dedicated FaaS Rego/JS environments
	DedicatedFaas bool `json:"dedicated_faas,omitempty" yaml:"dedicated_faas,omitempty"`

	// demo app
	DemoApp bool `json:"demo_app,omitempty" yaml:"demo_app,omitempty"`

	// hot reloading of templates
	DevMode bool `json:"dev_mode,omitempty" yaml:"dev_mode,omitempty"`

	// disable audit events
	DisableAuditEvents bool `json:"disable_audit_events,omitempty" yaml:"disable_audit_events,omitempty"`

	// display workspace wizard
	DisplayWorkspaceWizard bool `json:"display_workspace_wizard,omitempty" yaml:"display_workspace_wizard,omitempty"`

	// do not validate cert for private key jwt
	DoNotValidateCertForPrivateKeyJwt bool `json:"do_not_validate_cert_for_private_key_jwt,omitempty" yaml:"do_not_validate_cert_for_private_key_jwt,omitempty"`

	// drop tokens on password reset
	DropTokensOnPasswordReset bool `json:"drop_tokens_on_password_reset,omitempty" yaml:"drop_tokens_on_password_reset,omitempty"`

	// grpc url
	GrpcURL string `json:"grpc_url,omitempty" yaml:"grpc_url,omitempty"`

	// has google image search
	HasGoogleImageSearch bool `json:"has_google_image_search,omitempty" yaml:"has_google_image_search,omitempty"`

	// identifier-based discovery
	IdentifierBasedDiscovery bool `json:"identifier_based_discovery,omitempty" yaml:"identifier_based_discovery,omitempty"`

	// identity assurance
	IdentityAssurance bool `json:"identity_assurance,omitempty" yaml:"identity_assurance,omitempty"`

	// image proxy url
	ImageProxyURL string `json:"image_proxy_url,omitempty" yaml:"image_proxy_url,omitempty"`

	// when enabled and the display_workspace_wizard feature flag is set to true, a demo workspace with a set of preconfigured IDPs is created and no welcome screen is displayed
	InitializeDemoWorkspace bool `json:"initialize_demo_workspace,omitempty" yaml:"initialize_demo_workspace,omitempty"`

	// disable csrf
	InsecureDisableCsrf bool `json:"insecure_disable_csrf,omitempty" yaml:"insecure_disable_csrf,omitempty"`

	// insecure token exchange public clients
	InsecureTokenExchangePublicClients bool `json:"insecure_token_exchange_public_clients,omitempty" yaml:"insecure_token_exchange_public_clients,omitempty"`

	// openbanking ksa workspace and security profile
	OpenbankingKsa bool `json:"openbanking_ksa,omitempty" yaml:"openbanking_ksa,omitempty"`

	// organizations
	Organizations bool `json:"organizations,omitempty" yaml:"organizations,omitempty"`

	// permissions
	Permissions bool `json:"permissions,omitempty" yaml:"permissions,omitempty"`

	// rich authorization requests
	Rar bool `json:"rar,omitempty" yaml:"rar,omitempty"`

	// roles
	Roles bool `json:"roles,omitempty" yaml:"roles,omitempty"`

	// scope transient_otp
	ScopeTransientOtp bool `json:"scope_transient_otp,omitempty" yaml:"scope_transient_otp,omitempty"`

	// script runtimes
	ScriptRuntimes []*ScriptRuntime `json:"script_runtimes" yaml:"script_runtimes"`

	// self-service
	SelfService bool `json:"self_service,omitempty" yaml:"self_service,omitempty"`

	// simple api integration
	SimpleAPIIntegration bool `json:"simple_api_integration,omitempty" yaml:"simple_api_integration,omitempty"`

	// swagger ui
	SwaggerUI bool `json:"swagger_ui,omitempty" yaml:"swagger_ui,omitempty"`

	// system flags
	SystemFlags []string `json:"system_flags" yaml:"system_flags"`

	// system workspace access
	SystemWorkspaceAccess bool `json:"system_workspace_access,omitempty" yaml:"system_workspace_access,omitempty"`

	// tenant flags
	TenantFlags []string `json:"tenant_flags" yaml:"tenant_flags"`

	// tenant settings
	TenantSettings *TenantSettings `json:"tenant_settings,omitempty" yaml:"tenant_settings,omitempty"`

	// hierarchical dumps tenant APIs
	TreeDumpTenant bool `json:"tree_dump_tenant,omitempty" yaml:"tree_dump_tenant,omitempty"`

	// version
	Version string `json:"version,omitempty" yaml:"version,omitempty"`

	// with analytics
	WithAnalytics bool `json:"with_analytics,omitempty" yaml:"with_analytics,omitempty"`

	// with permissions
	WithPermissions bool `json:"with_permissions,omitempty" yaml:"with_permissions,omitempty"`

	// with roles
	WithRoles bool `json:"with_roles,omitempty" yaml:"with_roles,omitempty"`
}

Environment environment

swagger:model Environment

func (*Environment) ContextValidate ¶

func (m *Environment) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this environment based on the context it is used

func (*Environment) MarshalBinary ¶

func (m *Environment) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Environment) UnmarshalBinary ¶

func (m *Environment) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Environment) Validate ¶

func (m *Environment) Validate(formats strfmt.Registry) error

Validate validates this environment

type Error ¶

type Error struct {

	// details
	Details interface{} `json:"details,omitempty" yaml:"details,omitempty"`

	// error
	Error string `json:"error,omitempty" yaml:"error,omitempty"`

	// status code
	StatusCode int64 `json:"status_code,omitempty" yaml:"status_code,omitempty"`
}

Error HTTP error response

swagger:model Error

func (*Error) ContextValidate ¶

func (m *Error) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this error based on context it is used

func (*Error) MarshalBinary ¶

func (m *Error) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Error) UnmarshalBinary ¶

func (m *Error) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Error) Validate ¶

func (m *Error) Validate(formats strfmt.Registry) error

Validate validates this error

type Event ¶

type Event struct {

	// description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// name
	Name string `json:"name,omitempty" yaml:"name,omitempty"`
}

Event event

swagger:model Event

func (*Event) ContextValidate ¶

func (m *Event) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this event based on context it is used

func (*Event) MarshalBinary ¶

func (m *Event) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Event) UnmarshalBinary ¶

func (m *Event) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Event) Validate ¶

func (m *Event) Validate(formats strfmt.Registry) error

Validate validates this event

type EventAddress ¶

type EventAddress struct {

	// address value
	Value string `json:"value,omitempty" yaml:"value,omitempty"`
}

EventAddress EventAddress event address

swagger:model EventAddress

func (*EventAddress) ContextValidate ¶

func (m *EventAddress) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this event address based on context it is used

func (*EventAddress) MarshalBinary ¶

func (m *EventAddress) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*EventAddress) UnmarshalBinary ¶

func (m *EventAddress) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*EventAddress) Validate ¶

func (m *EventAddress) Validate(formats strfmt.Registry) error

Validate validates this event address

type EventIdentifier ¶

type EventIdentifier struct {

	// identifier value
	Value string `json:"value,omitempty" yaml:"value,omitempty"`
}

EventIdentifier EventIdentifier event identifier

swagger:model EventIdentifier

func (*EventIdentifier) ContextValidate ¶

func (m *EventIdentifier) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this event identifier based on context it is used

func (*EventIdentifier) MarshalBinary ¶

func (m *EventIdentifier) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*EventIdentifier) UnmarshalBinary ¶

func (m *EventIdentifier) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*EventIdentifier) Validate ¶

func (m *EventIdentifier) Validate(formats strfmt.Registry) error

Validate validates this event identifier

type EventSubject ¶

type EventSubject struct {

	// description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// events
	Events []*Event `json:"events" yaml:"events"`

	// name
	Name string `json:"name,omitempty" yaml:"name,omitempty"`
}

EventSubject event subject

swagger:model EventSubject

func (*EventSubject) ContextValidate ¶

func (m *EventSubject) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this event subject based on the context it is used

func (*EventSubject) MarshalBinary ¶

func (m *EventSubject) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*EventSubject) UnmarshalBinary ¶

func (m *EventSubject) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*EventSubject) Validate ¶

func (m *EventSubject) Validate(formats strfmt.Registry) error

Validate validates this event subject

type ExternalCIBAAuthenticationService ¶

type ExternalCIBAAuthenticationService struct {

	// credentials
	Credentials *ExternalServiceCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"`

	// url to the ciba authenticator service
	URL string `json:"url,omitempty" yaml:"url,omitempty"`
}

ExternalCIBAAuthenticationService external c i b a authentication service

swagger:model ExternalCIBAAuthenticationService

func (*ExternalCIBAAuthenticationService) ContextValidate ¶

func (m *ExternalCIBAAuthenticationService) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this external c i b a authentication service based on the context it is used

func (*ExternalCIBAAuthenticationService) MarshalBinary ¶

func (m *ExternalCIBAAuthenticationService) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ExternalCIBAAuthenticationService) UnmarshalBinary ¶

func (m *ExternalCIBAAuthenticationService) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ExternalCIBAAuthenticationService) Validate ¶

Validate validates this external c i b a authentication service

type ExternalCredentials ¶

type ExternalCredentials struct {

	// query or header
	APIKeyIn string `json:"api_key_in,omitempty" yaml:"api_key_in,omitempty"`

	// api key name
	APIKeyName string `json:"api_key_name,omitempty" yaml:"api_key_name,omitempty"`

	// api key value
	APIKeyValue string `json:"api_key_value,omitempty" yaml:"api_key_value,omitempty"`

	// http basic auth password
	Password string `json:"password,omitempty" yaml:"password,omitempty"`

	// http basic auth username
	Username string `json:"username,omitempty" yaml:"username,omitempty"`
}

ExternalCredentials External IDP specific credentials

swagger:model ExternalCredentials

func (*ExternalCredentials) ContextValidate ¶

func (m *ExternalCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this external credentials based on context it is used

func (*ExternalCredentials) MarshalBinary ¶

func (m *ExternalCredentials) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ExternalCredentials) UnmarshalBinary ¶

func (m *ExternalCredentials) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ExternalCredentials) Validate ¶

func (m *ExternalCredentials) Validate(formats strfmt.Registry) error

Validate validates this external credentials

type ExternalIDP ¶

type ExternalIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// credentials
	Credentials *ExternalCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// settings
	Settings *ExternalSettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

ExternalIDP external ID p

swagger:model ExternalIDP

func (*ExternalIDP) ContextValidate ¶

func (m *ExternalIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this external ID p based on the context it is used

func (*ExternalIDP) MarshalBinary ¶

func (m *ExternalIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ExternalIDP) UnmarshalBinary ¶

func (m *ExternalIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ExternalIDP) Validate ¶

func (m *ExternalIDP) Validate(formats strfmt.Registry) error

Validate validates this external ID p

type ExternalServiceCredentials ¶

type ExternalServiceCredentials struct {

	// query or header
	APIKeyIn string `json:"api_key_in,omitempty" yaml:"api_key_in,omitempty"`

	// api key name
	APIKeyName string `json:"api_key_name,omitempty" yaml:"api_key_name,omitempty"`

	// api key value
	APIKeyValue string `json:"api_key_value,omitempty" yaml:"api_key_value,omitempty"`

	// http basic auth password
	Password string `json:"password,omitempty" yaml:"password,omitempty"`

	// http basic auth username
	Username string `json:"username,omitempty" yaml:"username,omitempty"`
}

ExternalServiceCredentials external service credentials

swagger:model ExternalServiceCredentials

func (*ExternalServiceCredentials) ContextValidate ¶

func (m *ExternalServiceCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this external service credentials based on context it is used

func (*ExternalServiceCredentials) MarshalBinary ¶

func (m *ExternalServiceCredentials) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ExternalServiceCredentials) UnmarshalBinary ¶

func (m *ExternalServiceCredentials) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ExternalServiceCredentials) Validate ¶

func (m *ExternalServiceCredentials) Validate(formats strfmt.Registry) error

Validate validates this external service credentials

type ExternalSettings ¶

type ExternalSettings struct {

	// URL to your external datastore service
	// Example: https://example.com/
	URL string `json:"url,omitempty" yaml:"url,omitempty"`
}

ExternalSettings External IDP specific settings

swagger:model ExternalSettings

func (*ExternalSettings) ContextValidate ¶

func (m *ExternalSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this external settings based on context it is used

func (*ExternalSettings) MarshalBinary ¶

func (m *ExternalSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ExternalSettings) UnmarshalBinary ¶

func (m *ExternalSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ExternalSettings) Validate ¶

func (m *ExternalSettings) Validate(formats strfmt.Registry) error

Validate validates this external settings

type FDXClientStatus ¶

type FDXClientStatus string

FDXClientStatus f d x client status

swagger:model FDXClientStatus

func (FDXClientStatus) ContextValidate ¶

func (m FDXClientStatus) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this f d x client status based on context it is used

func (FDXClientStatus) Validate ¶

func (m FDXClientStatus) Validate(formats strfmt.Registry) error

Validate validates this f d x client status

type FDXConfiguration ¶

type FDXConfiguration struct {

	// initial client status
	InitialClientStatus FDXClientStatus `json:"initial_client_status,omitempty" yaml:"initial_client_status,omitempty"`

	// legal entity
	LegalEntity *LegalEntity `json:"legal_entity,omitempty" yaml:"legal_entity,omitempty"`
}

FDXConfiguration f d x configuration

swagger:model FDXConfiguration

func (*FDXConfiguration) ContextValidate ¶

func (m *FDXConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this f d x configuration based on the context it is used

func (*FDXConfiguration) MarshalBinary ¶

func (m *FDXConfiguration) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*FDXConfiguration) UnmarshalBinary ¶

func (m *FDXConfiguration) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*FDXConfiguration) Validate ¶

func (m *FDXConfiguration) Validate(formats strfmt.Registry) error

Validate validates this f d x configuration

type FDXConsent ¶

type FDXConsent struct {

	// authorization server id
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// client id
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// Time of consent creation
	// Format: date-time
	CreatedTime strfmt.DateTime `json:"createdTime,omitempty" yaml:"createdTime,omitempty"`

	// Consent duration, in days, from day of original grant.
	DurationPeriod int64 `json:"durationPeriod,omitempty" yaml:"durationPeriod,omitempty"`

	// duration type
	DurationType DurationType `json:"durationType,omitempty" yaml:"durationType,omitempty"`

	// Time of consent expiration
	// Format: date-time
	ExpirationTime strfmt.DateTime `json:"expirationTime,omitempty" yaml:"expirationTime,omitempty"`

	// Enumeration of the Clusters of granted data elements permissioned by this Consent Grant.
	// Data Clusters are described in FDX RFC 0167.
	GrantedResources []*FDXGrantedResource `json:"granted_resources" yaml:"granted_resources"`

	// id
	ID FDXConsentID `json:"id,omitempty" yaml:"id,omitempty"`

	// Period, in days, for which historical data may be requested; period is measured from request time, not grant time
	LookbackPeriod int64 `json:"lookbackPeriod,omitempty" yaml:"lookbackPeriod,omitempty"`

	// A collection of parameters identifying the Parties (including the legal entity operating branded products or services)
	// in the data sharing chain. Descriptive information is collected during Data Recipient registration at Data Provider,
	// and populated during issuance by DataProvider from its registry;
	Parties []*FDXConsentGrantParty `json:"parties" yaml:"parties"`

	// Enumeration of the Clusters of requested data elements permissioned by this Consent Grant.
	// Data Clusters are described in FDX RFC 0167.
	Resources []*FDXRequestedResource `json:"resources" yaml:"resources"`

	// revocation reason
	RevocationReason *FDXConsentRevocation `json:"revocationReason,omitempty" yaml:"revocationReason,omitempty"`

	// status
	Status ConsentStatus `json:"status,omitempty" yaml:"status,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// Time of last consent's status change
	// Format: date-time
	UpdatedTime strfmt.DateTime `json:"updatedTime,omitempty" yaml:"updatedTime,omitempty"`
}

FDXConsent f d x consent

swagger:model FDXConsent

func (*FDXConsent) ContextValidate ¶

func (m *FDXConsent) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this f d x consent based on the context it is used

func (*FDXConsent) MarshalBinary ¶

func (m *FDXConsent) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*FDXConsent) UnmarshalBinary ¶

func (m *FDXConsent) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*FDXConsent) Validate ¶

func (m *FDXConsent) Validate(formats strfmt.Registry) error

Validate validates this f d x consent

type FDXConsentGrantParty ¶

type FDXConsentGrantParty struct {

	// URL for party, where an end user could learn more about the company or application involved in the data sharing chain
	HomeURI string `json:"homeUri,omitempty" yaml:"homeUri,omitempty"`

	// URL for a logo asset to be displayed to the end user
	LogoURI string `json:"logoUri,omitempty" yaml:"logoUri,omitempty"`

	// Common name for party, as it should be displayed to the end user
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Registered id of party
	RegisteredEntityIdentifier string `json:"registeredEntityIdentifier,omitempty" yaml:"registeredEntityIdentifier,omitempty"`

	// Registered name of party
	RegisteredEntityName string `json:"registeredEntityName,omitempty" yaml:"registeredEntityName,omitempty"`

	// The registry with the party's registered name and id
	RegistryName string `json:"registryName,omitempty" yaml:"registryName,omitempty"`
}

FDXConsentGrantParty Consent Party entity Details on the non-end user parties in the Consent Grant. Includes the legal entity operating branded products or services in the data sharing chain. Descriptive information is collected during Data Recipient registration at Data Provider, and populated during issuance by Data Provider from its registry

swagger:model FDXConsentGrantParty

func (*FDXConsentGrantParty) ContextValidate ¶

func (m *FDXConsentGrantParty) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this f d x consent grant party based on context it is used

func (*FDXConsentGrantParty) MarshalBinary ¶

func (m *FDXConsentGrantParty) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*FDXConsentGrantParty) UnmarshalBinary ¶

func (m *FDXConsentGrantParty) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*FDXConsentGrantParty) Validate ¶

func (m *FDXConsentGrantParty) Validate(formats strfmt.Registry) error

Validate validates this f d x consent grant party

type FDXConsentID ¶

type FDXConsentID string

FDXConsentID f d x consent ID

swagger:model FDXConsentID

func (FDXConsentID) ContextValidate ¶

func (m FDXConsentID) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this f d x consent ID based on context it is used

func (FDXConsentID) Validate ¶

func (m FDXConsentID) Validate(formats strfmt.Registry) error

Validate validates this f d x consent ID

type FDXConsentRevocation ¶

type FDXConsentRevocation struct {

	// Revocation initiator
	// Example: \"INDIVIDUAL\
	// Enum: [DATA_ACCESS_PLATFORM DATA_PROVIDER DATA_RECIPIENT INDIVIDUAL MERCHANT VENDOR]
	Initiator string `json:"initiator,omitempty" yaml:"initiator,omitempty"`

	// Revocation reason
	// Example: \"USER_ACTION\
	// Enum: [BUSINESS_RULE USER_ACTION]
	Reason string `json:"reason,omitempty" yaml:"reason,omitempty"`
}

FDXConsentRevocation Revocation data

swagger:model FDXConsentRevocation

func (*FDXConsentRevocation) ContextValidate ¶

func (m *FDXConsentRevocation) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this f d x consent revocation based on context it is used

func (*FDXConsentRevocation) MarshalBinary ¶

func (m *FDXConsentRevocation) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*FDXConsentRevocation) UnmarshalBinary ¶

func (m *FDXConsentRevocation) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*FDXConsentRevocation) Validate ¶

func (m *FDXConsentRevocation) Validate(formats strfmt.Registry) error

Validate validates this f d x consent revocation

type FDXGrantedResource ¶

type FDXGrantedResource struct {

	// The names of clusters with data elements permitted.
	// Example: ["ACCOUNT_DETAILED","TRANSACTIONS","STATEMENTS"]
	DataClusters []string `json:"dataClusters" yaml:"dataClusters"`

	// resource ID
	// Example: b14e1e714693bc00
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// A type of resource that holds the permitted data elements. This parameter can be extended to support additional resource types.
	// Example: ACCOUNT
	ResourceType string `json:"resourceType,omitempty" yaml:"resourceType,omitempty"`
}

FDXGrantedResource f d x granted resource

swagger:model FDXGrantedResource

func (*FDXGrantedResource) ContextValidate ¶

func (m *FDXGrantedResource) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this f d x granted resource based on context it is used

func (*FDXGrantedResource) MarshalBinary ¶

func (m *FDXGrantedResource) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*FDXGrantedResource) UnmarshalBinary ¶

func (m *FDXGrantedResource) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*FDXGrantedResource) Validate ¶

func (m *FDXGrantedResource) Validate(formats strfmt.Registry) error

Validate validates this f d x granted resource

type FDXMetadata ¶

type FDXMetadata struct {

	// Contact information of individuals responsible for the Data Recipient application.
	Contacts []string `json:"contacts" yaml:"contacts"`

	// The time window the end-user grants the consent for. Used when `duration_type`=`TIME_BOUND`.
	DurationPeriod int64 `json:"duration_period,omitempty" yaml:"duration_period,omitempty"`

	// The rule of consent granting by the end-user to indicate whether they must take action
	// to revoke access or the consent will be revoked automatically.
	//
	// One of: `ONE_TIME`, `PERSISTENT`, `TIME_BOUND`
	// Example: ONE_TIME
	DurationType []DurationType `json:"duration_type" yaml:"duration_type"`

	// An array of the intermediaries for this Data Recipient.
	Intermediaries []*Intermediary `json:"intermediaries" yaml:"intermediaries"`

	// The maximum number of days allowed for Data Recipient consumers to obtain in transaction history, effective from
	// the current date
	LookbackPeriod int64 `json:"lookback_period,omitempty" yaml:"lookback_period,omitempty"`

	// The list of external registries where the Data Recipient is registered. It comprises the following details:
	// name, identifier, and the `registry` string with any additional info.
	RegistryReferences []*RegistryReference `json:"registry_references" yaml:"registry_references"`

	// status
	Status FDXClientStatus `json:"status,omitempty" yaml:"status,omitempty"`
}

FDXMetadata f d x metadata

swagger:model FDXMetadata

func (*FDXMetadata) ContextValidate ¶

func (m *FDXMetadata) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this f d x metadata based on the context it is used

func (*FDXMetadata) MarshalBinary ¶

func (m *FDXMetadata) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*FDXMetadata) UnmarshalBinary ¶

func (m *FDXMetadata) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*FDXMetadata) Validate ¶

func (m *FDXMetadata) Validate(formats strfmt.Registry) error

Validate validates this f d x metadata

type FDXParty ¶

type FDXParty struct {

	// home uri
	HomeURI string `json:"home_uri,omitempty" yaml:"home_uri,omitempty"`

	// logo uri
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// name
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// registered entity identifier
	RegisteredEntityIdentifier string `json:"registered_entity_identifier,omitempty" yaml:"registered_entity_identifier,omitempty"`

	// registered entity name
	RegisteredEntityName string `json:"registered_entity_name,omitempty" yaml:"registered_entity_name,omitempty"`

	// registry name
	RegistryName string `json:"registry_name,omitempty" yaml:"registry_name,omitempty"`
}

FDXParty f d x party

swagger:model FDXParty

func (*FDXParty) ContextValidate ¶

func (m *FDXParty) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this f d x party based on context it is used

func (*FDXParty) MarshalBinary ¶

func (m *FDXParty) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*FDXParty) UnmarshalBinary ¶

func (m *FDXParty) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*FDXParty) Validate ¶

func (m *FDXParty) Validate(formats strfmt.Registry) error

Validate validates this f d x party

type FDXRequestedResource ¶

type FDXRequestedResource struct {

	// The names of clusters with data elements permitted.
	// Example: ["ACCOUNT_DETAILED","TRANSACTIONS","STATEMENTS"]
	DataClusters []string `json:"dataClusters" yaml:"dataClusters"`

	// A type of resource that holds the permitted data elements. This parameter can be extended to support additional resource types.
	// Example: ACCOUNT
	ResourceType string `json:"resourceType,omitempty" yaml:"resourceType,omitempty"`
}

FDXRequestedResource f d x requested resource

swagger:model FDXRequestedResource

func (*FDXRequestedResource) ContextValidate ¶

func (m *FDXRequestedResource) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this f d x requested resource based on context it is used

func (*FDXRequestedResource) MarshalBinary ¶

func (m *FDXRequestedResource) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*FDXRequestedResource) UnmarshalBinary ¶

func (m *FDXRequestedResource) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*FDXRequestedResource) Validate ¶

func (m *FDXRequestedResource) Validate(formats strfmt.Registry) error

Validate validates this f d x requested resource

type Gateway ¶

type Gateway struct {

	// authorization server id
	// Example: default
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// id of a client created for this gateway for authentication
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// if true services are created automatically for each new discovered api group
	CreateAndBindServicesAutomatically bool `json:"create_and_bind_services_automatically,omitempty" yaml:"create_and_bind_services_automatically,omitempty"`

	// description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// unique gateway id
	// Example: 1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// last time a client fetched configuration
	// Format: date-time
	LastActive strfmt.DateTime `json:"last_active,omitempty" yaml:"last_active,omitempty"`

	// gateway name
	// Example: Cloudentity Pyron
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// tenant id
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange
	TokenExchange *GatewayTokenExchangeSettings `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"`

	// Token exchange client id
	TokenExchangeClientID string `json:"token_exchange_client_id,omitempty" yaml:"token_exchange_client_id,omitempty"`

	// gateway type, one of: pyron, aws
	// Example: pyron
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

Gateway gateway

swagger:model Gateway

func (*Gateway) ContextValidate ¶

func (m *Gateway) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this gateway based on the context it is used

func (*Gateway) MarshalBinary ¶

func (m *Gateway) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Gateway) UnmarshalBinary ¶

func (m *Gateway) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Gateway) Validate ¶

func (m *Gateway) Validate(formats strfmt.Registry) error

Validate validates this gateway

type GatewayAPI ¶

type GatewayAPI struct {

	// api type
	// Enum: [rest graphql]
	APIType string `json:"api_type,omitempty" yaml:"api_type,omitempty"`

	// graphql schema
	GraphqlSchema string `json:"graphql_schema,omitempty" yaml:"graphql_schema,omitempty"`

	// method
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// path
	Path string `json:"path,omitempty" yaml:"path,omitempty"`
}

GatewayAPI gateway API

swagger:model GatewayAPI

func (*GatewayAPI) ContextValidate ¶

func (m *GatewayAPI) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this gateway API based on context it is used

func (*GatewayAPI) MarshalBinary ¶

func (m *GatewayAPI) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GatewayAPI) UnmarshalBinary ¶

func (m *GatewayAPI) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GatewayAPI) Validate ¶

func (m *GatewayAPI) Validate(formats strfmt.Registry) error

Validate validates this gateway API

type GatewayAPIGroup ¶

type GatewayAPIGroup struct {

	// List of APIs
	Apis []*GatewayAPI `json:"apis" yaml:"apis"`

	// gateway id
	GatewayID string `json:"gateway_id,omitempty" yaml:"gateway_id,omitempty"`

	// API group ID
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// metadata
	Metadata *APIGroupMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// API group name
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// server id
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// service id
	ServiceID string `json:"service_id,omitempty" yaml:"service_id,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`
}

GatewayAPIGroup gateway API group

swagger:model GatewayAPIGroup

func (*GatewayAPIGroup) ContextValidate ¶

func (m *GatewayAPIGroup) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this gateway API group based on the context it is used

func (*GatewayAPIGroup) MarshalBinary ¶

func (m *GatewayAPIGroup) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GatewayAPIGroup) UnmarshalBinary ¶

func (m *GatewayAPIGroup) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GatewayAPIGroup) Validate ¶

func (m *GatewayAPIGroup) Validate(formats strfmt.Registry) error

Validate validates this gateway API group

type GatewayAPIGroups ¶

type GatewayAPIGroups struct {

	// groups
	Groups []*GatewayAPIGroup `json:"groups" yaml:"groups"`
}

GatewayAPIGroups gateway API groups

swagger:model GatewayAPIGroups

func (*GatewayAPIGroups) ContextValidate ¶

func (m *GatewayAPIGroups) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this gateway API groups based on the context it is used

func (*GatewayAPIGroups) MarshalBinary ¶

func (m *GatewayAPIGroups) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GatewayAPIGroups) UnmarshalBinary ¶

func (m *GatewayAPIGroups) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GatewayAPIGroups) Validate ¶

func (m *GatewayAPIGroups) Validate(formats strfmt.Registry) error

Validate validates this gateway API groups

type GatewayTokenExchangeSettings ¶

type GatewayTokenExchangeSettings struct {

	// enabled
	Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"`

	// trusted idp ids
	TrustedIdpIds []string `json:"trusted_idp_ids" yaml:"trusted_idp_ids"`
}

GatewayTokenExchangeSettings gateway token exchange settings

swagger:model GatewayTokenExchangeSettings

func (*GatewayTokenExchangeSettings) ContextValidate ¶

func (m *GatewayTokenExchangeSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this gateway token exchange settings based on context it is used

func (*GatewayTokenExchangeSettings) MarshalBinary ¶

func (m *GatewayTokenExchangeSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GatewayTokenExchangeSettings) UnmarshalBinary ¶

func (m *GatewayTokenExchangeSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GatewayTokenExchangeSettings) Validate ¶

func (m *GatewayTokenExchangeSettings) Validate(formats strfmt.Registry) error

Validate validates this gateway token exchange settings

type GatewayWithClient ¶

type GatewayWithClient struct {

	// authorization server id
	// Example: default
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// client
	Client *Client `json:"client,omitempty" yaml:"client,omitempty"`

	// id of a client created for this gateway for authentication
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// if true services are created automatically for each new discovered api group
	CreateAndBindServicesAutomatically bool `json:"create_and_bind_services_automatically,omitempty" yaml:"create_and_bind_services_automatically,omitempty"`

	// description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// unique gateway id
	// Example: 1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// issuer url
	IssuerURL string `json:"issuer_url,omitempty" yaml:"issuer_url,omitempty"`

	// last time a client fetched configuration
	// Format: date-time
	LastActive strfmt.DateTime `json:"last_active,omitempty" yaml:"last_active,omitempty"`

	// gateway name
	// Example: Cloudentity Pyron
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// server url
	ServerURL string `json:"server_url,omitempty" yaml:"server_url,omitempty"`

	// tenant id
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange
	TokenExchange *GatewayTokenExchangeSettings `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"`

	// Token exchange client id
	TokenExchangeClientID string `json:"token_exchange_client_id,omitempty" yaml:"token_exchange_client_id,omitempty"`

	// gateway type, one of: pyron, aws
	// Example: pyron
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

GatewayWithClient gateway with client

swagger:model GatewayWithClient

func (*GatewayWithClient) ContextValidate ¶

func (m *GatewayWithClient) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this gateway with client based on the context it is used

func (*GatewayWithClient) MarshalBinary ¶

func (m *GatewayWithClient) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GatewayWithClient) UnmarshalBinary ¶

func (m *GatewayWithClient) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GatewayWithClient) Validate ¶

func (m *GatewayWithClient) Validate(formats strfmt.Registry) error

Validate validates this gateway with client

type Gateways ¶

type Gateways struct {

	// gateways
	Gateways []*Gateway `json:"gateways" yaml:"gateways"`
}

Gateways gateways

swagger:model Gateways

func (*Gateways) ContextValidate ¶

func (m *Gateways) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this gateways based on the context it is used

func (*Gateways) MarshalBinary ¶

func (m *Gateways) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Gateways) UnmarshalBinary ¶

func (m *Gateways) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Gateways) Validate ¶

func (m *Gateways) Validate(formats strfmt.Registry) error

Validate validates this gateways

type GithubCredentials ¶

type GithubCredentials struct {

	// OAuth client application secret from your GitHub Oauth application settings
	ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"`
}

GithubCredentials GitHub IDP specific credentials

swagger:model GithubCredentials

func (*GithubCredentials) ContextValidate ¶

func (m *GithubCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this github credentials based on context it is used

func (*GithubCredentials) MarshalBinary ¶

func (m *GithubCredentials) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GithubCredentials) UnmarshalBinary ¶

func (m *GithubCredentials) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GithubCredentials) Validate ¶

func (m *GithubCredentials) Validate(formats strfmt.Registry) error

Validate validates this github credentials

type GithubEmbeddedIDP ¶

type GithubEmbeddedIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

GithubEmbeddedIDP github embedded ID p

swagger:model GithubEmbeddedIDP

func (*GithubEmbeddedIDP) ContextValidate ¶

func (m *GithubEmbeddedIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this github embedded ID p based on the context it is used

func (*GithubEmbeddedIDP) MarshalBinary ¶

func (m *GithubEmbeddedIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GithubEmbeddedIDP) UnmarshalBinary ¶

func (m *GithubEmbeddedIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GithubEmbeddedIDP) Validate ¶

func (m *GithubEmbeddedIDP) Validate(formats strfmt.Registry) error

Validate validates this github embedded ID p

type GithubIDP ¶

type GithubIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// credentials
	Credentials *GithubCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// settings
	Settings *GithubSettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

GithubIDP github ID p

swagger:model GithubIDP

func (*GithubIDP) ContextValidate ¶

func (m *GithubIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this github ID p based on the context it is used

func (*GithubIDP) MarshalBinary ¶

func (m *GithubIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GithubIDP) UnmarshalBinary ¶

func (m *GithubIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GithubIDP) Validate ¶

func (m *GithubIDP) Validate(formats strfmt.Registry) error

Validate validates this github ID p

type GithubSettings ¶

type GithubSettings struct {

	// Client ID of your OAuth application registered in GitHub
	//
	// You can find your client ID in GitHub > Settings > Developer Settings > OAuth Apps > Your Application
	// Example: client
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// If enabled, the groups a user belongs to are collected
	//
	// If enabled, the `groups` attribute from the authentication context gets populated with the
	// user's groups and takes from of `organization_id.group name`
	FetchGroups bool `json:"fetch_groups,omitempty" yaml:"fetch_groups,omitempty"`

	// An array of allowed OAuth scopes which the client requests
	//
	// The following scopes can be configured for GitHub application:
	// `phone`, `email`, `openid`, `profile`.
	// Example: ["email","profile","openid"]
	Scopes []string `json:"scopes" yaml:"scopes"`

	// Whether to send the identifier as a `login_hint` parameter to the IDP
	SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"`
}

GithubSettings GitHub IDP specific settings

swagger:model GithubSettings

func (*GithubSettings) ContextValidate ¶

func (m *GithubSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this github settings based on context it is used

func (*GithubSettings) MarshalBinary ¶

func (m *GithubSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GithubSettings) UnmarshalBinary ¶

func (m *GithubSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GithubSettings) Validate ¶

func (m *GithubSettings) Validate(formats strfmt.Registry) error

Validate validates this github settings

type GoogleCredentials ¶

type GoogleCredentials struct {

	// OAuth client application secret
	ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"`
}

GoogleCredentials Google IDP specific credentials

swagger:model GoogleCredentials

func (*GoogleCredentials) ContextValidate ¶

func (m *GoogleCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this google credentials based on context it is used

func (*GoogleCredentials) MarshalBinary ¶

func (m *GoogleCredentials) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GoogleCredentials) UnmarshalBinary ¶

func (m *GoogleCredentials) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GoogleCredentials) Validate ¶

func (m *GoogleCredentials) Validate(formats strfmt.Registry) error

Validate validates this google credentials

type GoogleEmbeddedIDP ¶

type GoogleEmbeddedIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

GoogleEmbeddedIDP google embedded ID p

swagger:model GoogleEmbeddedIDP

func (*GoogleEmbeddedIDP) ContextValidate ¶

func (m *GoogleEmbeddedIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this google embedded ID p based on the context it is used

func (*GoogleEmbeddedIDP) MarshalBinary ¶

func (m *GoogleEmbeddedIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GoogleEmbeddedIDP) UnmarshalBinary ¶

func (m *GoogleEmbeddedIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GoogleEmbeddedIDP) Validate ¶

func (m *GoogleEmbeddedIDP) Validate(formats strfmt.Registry) error

Validate validates this google embedded ID p

type GoogleIDP ¶

type GoogleIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// credentials
	Credentials *GoogleCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// settings
	Settings *GoogleSettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

GoogleIDP google ID p

swagger:model GoogleIDP

func (*GoogleIDP) ContextValidate ¶

func (m *GoogleIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this google ID p based on the context it is used

func (*GoogleIDP) MarshalBinary ¶

func (m *GoogleIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GoogleIDP) UnmarshalBinary ¶

func (m *GoogleIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GoogleIDP) Validate ¶

func (m *GoogleIDP) Validate(formats strfmt.Registry) error

Validate validates this google ID p

type GoogleSettings ¶

type GoogleSettings struct {

	// OAuth client application identifier
	// Example: client
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// If enabled, users' data is collected by calling the `userinfo` endpoint.
	GetUserInfo bool `json:"get_user_info,omitempty" yaml:"get_user_info,omitempty"`

	// URL used to define the {baseURL} for any OpenID Connect endpoint when authorizing against ACP.
	IssuerURL string `json:"issuer_url,omitempty" yaml:"issuer_url,omitempty"`

	// An array of additional scopes your client requests
	// Example: ["email","profile","openid"]
	Scopes []string `json:"scopes" yaml:"scopes"`

	// Whether to send the identifier as a `login_hint` parameter to the IDP
	SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"`
}

GoogleSettings Google IDP specific settings

swagger:model GoogleSettings

func (*GoogleSettings) ContextValidate ¶

func (m *GoogleSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this google settings based on context it is used

func (*GoogleSettings) MarshalBinary ¶

func (m *GoogleSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GoogleSettings) UnmarshalBinary ¶

func (m *GoogleSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GoogleSettings) Validate ¶

func (m *GoogleSettings) Validate(formats strfmt.Registry) error

Validate validates this google settings

type GrantIdentityPoolRoleRequest ¶

type GrantIdentityPoolRoleRequest struct {

	// identity pool user pool id
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// identity pool user id
	IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"`

	// idp user idp id
	IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"`

	// role
	// Example: user_manager
	// Enum: [user_manager]
	Role string `json:"role,omitempty" yaml:"role,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	// Enum: [identity_pool_user idp]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// idp user workspace id
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

GrantIdentityPoolRoleRequest grant identity pool role request

swagger:model GrantIdentityPoolRoleRequest

func (*GrantIdentityPoolRoleRequest) ContextValidate ¶

func (m *GrantIdentityPoolRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this grant identity pool role request based on context it is used

func (*GrantIdentityPoolRoleRequest) MarshalBinary ¶

func (m *GrantIdentityPoolRoleRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GrantIdentityPoolRoleRequest) UnmarshalBinary ¶

func (m *GrantIdentityPoolRoleRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GrantIdentityPoolRoleRequest) Validate ¶

func (m *GrantIdentityPoolRoleRequest) Validate(formats strfmt.Registry) error

Validate validates this grant identity pool role request

type GrantTenantRoleRequest ¶

type GrantTenantRoleRequest struct {

	// identity pool user pool id
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// identity pool user id
	IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"`

	// idp user idp id
	IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"`

	// role
	// Example: admin
	// Enum: [admin business_admin auditor member]
	Role string `json:"role,omitempty" yaml:"role,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	// Enum: [identity_pool_user idp]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// idp user workspace id
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

GrantTenantRoleRequest grant tenant role request

swagger:model GrantTenantRoleRequest

func (*GrantTenantRoleRequest) ContextValidate ¶

func (m *GrantTenantRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this grant tenant role request based on context it is used

func (*GrantTenantRoleRequest) MarshalBinary ¶

func (m *GrantTenantRoleRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GrantTenantRoleRequest) UnmarshalBinary ¶

func (m *GrantTenantRoleRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GrantTenantRoleRequest) Validate ¶

func (m *GrantTenantRoleRequest) Validate(formats strfmt.Registry) error

Validate validates this grant tenant role request

type GrantWorkspaceRoleRequest ¶

type GrantWorkspaceRoleRequest struct {

	// identity pool user pool id
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// identity pool user id
	IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"`

	// idp user idp id
	IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"`

	// role
	// Example: admin
	// Enum: [admin auditor manager user_manager member]
	Role string `json:"role,omitempty" yaml:"role,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	// Enum: [identity_pool_user idp]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// idp user workspace id
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

GrantWorkspaceRoleRequest grant workspace role request

swagger:model GrantWorkspaceRoleRequest

func (*GrantWorkspaceRoleRequest) ContextValidate ¶

func (m *GrantWorkspaceRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this grant workspace role request based on context it is used

func (*GrantWorkspaceRoleRequest) MarshalBinary ¶

func (m *GrantWorkspaceRoleRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GrantWorkspaceRoleRequest) UnmarshalBinary ¶

func (m *GrantWorkspaceRoleRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GrantWorkspaceRoleRequest) Validate ¶

func (m *GrantWorkspaceRoleRequest) Validate(formats strfmt.Registry) error

Validate validates this grant workspace role request

type GraphQLField ¶

type GraphQLField struct {

	// if false it is not possible to assign a policy, set to false if policy is declaratively assigned
	CanHavePolicy bool `json:"can_have_policy,omitempty" yaml:"can_have_policy,omitempty"`

	// name of graphQL field
	// Example: id
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// optional id of a policy
	// Example: block
	PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"`
}

GraphQLField graph q l field

swagger:model GraphQLField

func (*GraphQLField) ContextValidate ¶

func (m *GraphQLField) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this graph q l field based on context it is used

func (*GraphQLField) MarshalBinary ¶

func (m *GraphQLField) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GraphQLField) UnmarshalBinary ¶

func (m *GraphQLField) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GraphQLField) Validate ¶

func (m *GraphQLField) Validate(formats strfmt.Registry) error

Validate validates this graph q l field

type GraphQLType ¶

type GraphQLType struct {

	// if false it is not possible to assign a policy, set to false if policy is declaratively assigned
	CanHavePolicy bool `json:"can_have_policy,omitempty" yaml:"can_have_policy,omitempty"`

	// optional fields of graphql type
	Fields []*GraphQLField `json:"fields" yaml:"fields"`

	// name of graphQL type, currently supported types are Interfaces and Objects
	// Example: block
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// optional id of a policy
	// Example: block
	PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"`
}

GraphQLType graph q l type

swagger:model GraphQLType

func (*GraphQLType) ContextValidate ¶

func (m *GraphQLType) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this graph q l type based on the context it is used

func (*GraphQLType) MarshalBinary ¶

func (m *GraphQLType) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*GraphQLType) UnmarshalBinary ¶

func (m *GraphQLType) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*GraphQLType) Validate ¶

func (m *GraphQLType) Validate(formats strfmt.Registry) error

Validate validates this graph q l type

type GraphQLTypes ¶

type GraphQLTypes []*GraphQLType

GraphQLTypes graph q l types

swagger:model GraphQLTypes

func (GraphQLTypes) ContextValidate ¶

func (m GraphQLTypes) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this graph q l types based on the context it is used

func (GraphQLTypes) Validate ¶

func (m GraphQLTypes) Validate(formats strfmt.Registry) error

Validate validates this graph q l types

type HTTPRequest ¶

type HTTPRequest struct {

	// request body
	Body string `json:"body,omitempty" yaml:"body,omitempty"`

	// http method
	// Example: GET
	// Required: true
	Method string `json:"method" yaml:"method"`

	// url path
	// Required: true
	Path string `json:"path" yaml:"path"`

	// url query params
	Query []*HTTPRequestParam `json:"query" yaml:"query"`
}

HTTPRequest HTTP request

swagger:model HTTPRequest

func (*HTTPRequest) ContextValidate ¶

func (m *HTTPRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this HTTP request based on the context it is used

func (*HTTPRequest) MarshalBinary ¶

func (m *HTTPRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*HTTPRequest) UnmarshalBinary ¶

func (m *HTTPRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*HTTPRequest) Validate ¶

func (m *HTTPRequest) Validate(formats strfmt.Registry) error

Validate validates this HTTP request

type HTTPRequestParam ¶

type HTTPRequestParam struct {

	// name
	// Required: true
	Name string `json:"name" yaml:"name"`

	// value
	Value string `json:"value,omitempty" yaml:"value,omitempty"`
}

HTTPRequestParam HTTP request param

swagger:model HTTPRequestParam

func (*HTTPRequestParam) ContextValidate ¶

func (m *HTTPRequestParam) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this HTTP request param based on context it is used

func (*HTTPRequestParam) MarshalBinary ¶

func (m *HTTPRequestParam) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*HTTPRequestParam) UnmarshalBinary ¶

func (m *HTTPRequestParam) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*HTTPRequestParam) Validate ¶

func (m *HTTPRequestParam) Validate(formats strfmt.Registry) error

Validate validates this HTTP request param

type IDPBase ¶

type IDPBase struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

IDPBase ID p base

swagger:model IDPBase

func (*IDPBase) ContextValidate ¶

func (m *IDPBase) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this ID p base based on the context it is used

func (*IDPBase) MarshalBinary ¶

func (m *IDPBase) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IDPBase) UnmarshalBinary ¶

func (m *IDPBase) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IDPBase) Validate ¶

func (m *IDPBase) Validate(formats strfmt.Registry) error

Validate validates this ID p base

type IDPConfiguration ¶

type IDPConfiguration struct {

	// If set to `true`, the claims are reloaded while issuing an access token.
	//
	// Currently it is only available for Identity Pool IDP.
	ReloadClaimsAtRefreshToken bool `json:"reload_claims_at_refresh_token,omitempty" yaml:"reload_claims_at_refresh_token,omitempty"`
}

IDPConfiguration ID p configuration

swagger:model IDPConfiguration

func (*IDPConfiguration) ContextValidate ¶

func (m *IDPConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this ID p configuration based on context it is used

func (*IDPConfiguration) MarshalBinary ¶

func (m *IDPConfiguration) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IDPConfiguration) UnmarshalBinary ¶

func (m *IDPConfiguration) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IDPConfiguration) Validate ¶

func (m *IDPConfiguration) Validate(formats strfmt.Registry) error

Validate validates this ID p configuration

type IDPDiscovery ¶

type IDPDiscovery struct {

	// discovery mode
	// Enum: [domain_matching script_execution]
	DiscoveryMode string `json:"discovery_mode,omitempty" yaml:"discovery_mode,omitempty"`

	// If enabled, IDP discovery automatically redirects the user to their own IDP and does not
	// display IDPs of other users while the users accesses the server/application.
	// Example: false
	Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"`
}

IDPDiscovery ID p discovery

swagger:model IDPDiscovery

func (*IDPDiscovery) ContextValidate ¶

func (m *IDPDiscovery) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this ID p discovery based on context it is used

func (*IDPDiscovery) MarshalBinary ¶

func (m *IDPDiscovery) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IDPDiscovery) UnmarshalBinary ¶

func (m *IDPDiscovery) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IDPDiscovery) Validate ¶

func (m *IDPDiscovery) Validate(formats strfmt.Registry) error

Validate validates this ID p discovery

type IDPDiscoverySettings ¶

type IDPDiscoverySettings struct {

	// An array of email domains configured for an IDP for the purposes of IDP discovery
	//
	// If a domain is connected to an IDP and this domain is used during the login process, the IDP
	// is automatically discovered and the user is either presented with a suggested IDP or is
	// instantly redirected to their IDP configured for the user's email domain.
	Domains []IDPDomain `json:"domains" yaml:"domains"`

	// When enabled, this provider will appear on the selection list, in case the discovery process
	// could not find a matching provider. This can be used to limit the username enumeration attacks
	// and at least one of the providers is recommended to be set as fallback provider.
	FallbackProvider bool `json:"fallback_provider,omitempty" yaml:"fallback_provider,omitempty"`

	// When enabled, the system will first attempt to find the identifier in the corresponding user store.
	//
	// This function is only applicable for Identity Pools and Identity Providers that have Provisioning
	// mechanism activated.
	IdentifierBasedMatching bool `json:"identifier_based_matching,omitempty" yaml:"identifier_based_matching,omitempty"`

	// If the intelligent IDP discovery is enabled and the instant redirect flag is on, the user is
	// instantly redirected to a proper Identity Provider as soon as a match is hit based on the
	// domain when a user is typing their email in the username field
	InstantRedirect bool `json:"instant_redirect,omitempty" yaml:"instant_redirect,omitempty"`
}

IDPDiscoverySettings ID p discovery settings

swagger:model IDPDiscoverySettings

func (*IDPDiscoverySettings) ContextValidate ¶

func (m *IDPDiscoverySettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this ID p discovery settings based on the context it is used

func (*IDPDiscoverySettings) MarshalBinary ¶

func (m *IDPDiscoverySettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IDPDiscoverySettings) UnmarshalBinary ¶

func (m *IDPDiscoverySettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IDPDiscoverySettings) Validate ¶

func (m *IDPDiscoverySettings) Validate(formats strfmt.Registry) error

Validate validates this ID p discovery settings

type IDPDomain ¶

type IDPDomain string

IDPDomain ID p domain

swagger:model IDPDomain

func (IDPDomain) ContextValidate ¶

func (m IDPDomain) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this ID p domain based on context it is used

func (IDPDomain) Validate ¶

func (m IDPDomain) Validate(formats strfmt.Registry) error

Validate validates this ID p domain

type IDPPayload ¶

type IDPPayload struct {

	// Unique identifierof IDP.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// Defines the type of an IDP, e.g. google, saml
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of IDP.
	Name string `json:"name,omitempty" yaml:"name,omitempty"`
}

IDPPayload ID p payload

swagger:model IDPPayload

func (*IDPPayload) ContextValidate ¶

func (m *IDPPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this ID p payload based on context it is used

func (*IDPPayload) MarshalBinary ¶

func (m *IDPPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IDPPayload) UnmarshalBinary ¶

func (m *IDPPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IDPPayload) Validate ¶

func (m *IDPPayload) Validate(formats strfmt.Registry) error

Validate validates this ID p payload

type IDPSSODescriptor ¶

type IDPSSODescriptor struct {

	// artifact resolution services
	ArtifactResolutionServices []*Endpoint `json:"ArtifactResolutionServices" yaml:"ArtifactResolutionServices"`

	// assertion ID request services
	AssertionIDRequestServices []*Endpoint `json:"AssertionIDRequestServices" yaml:"AssertionIDRequestServices"`

	// attribute profiles
	AttributeProfiles []string `json:"AttributeProfiles" yaml:"AttributeProfiles"`

	// attributes
	Attributes []*Attribute `json:"Attributes" yaml:"Attributes"`

	// cache duration
	CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"`

	// contact people
	ContactPeople []*ContactPerson `json:"ContactPeople" yaml:"ContactPeople"`

	// error URL
	ErrorURL string `json:"ErrorURL,omitempty" yaml:"ErrorURL,omitempty"`

	// ID
	ID string `json:"ID,omitempty" yaml:"ID,omitempty"`

	// key descriptors
	KeyDescriptors []*KeyDescriptor `json:"KeyDescriptors" yaml:"KeyDescriptors"`

	// manage name ID services
	ManageNameIDServices []*Endpoint `json:"ManageNameIDServices" yaml:"ManageNameIDServices"`

	// name ID formats
	NameIDFormats []NameIDFormat `json:"NameIDFormats" yaml:"NameIDFormats"`

	// name ID mapping services
	NameIDMappingServices []*Endpoint `json:"NameIDMappingServices" yaml:"NameIDMappingServices"`

	// organization
	Organization *Organization `json:"Organization,omitempty" yaml:"Organization,omitempty"`

	// protocol support enumeration
	ProtocolSupportEnumeration string `json:"ProtocolSupportEnumeration,omitempty" yaml:"ProtocolSupportEnumeration,omitempty"`

	// signature
	Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"`

	// single logout services
	SingleLogoutServices []*Endpoint `json:"SingleLogoutServices" yaml:"SingleLogoutServices"`

	// single sign on services
	SingleSignOnServices []*Endpoint `json:"SingleSignOnServices" yaml:"SingleSignOnServices"`

	// valid until
	// Format: date-time
	ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"`

	// want authn requests signed
	WantAuthnRequestsSigned bool `json:"WantAuthnRequestsSigned,omitempty" yaml:"WantAuthnRequestsSigned,omitempty"`

	// XML name
	XMLName *Name `json:"XMLName,omitempty" yaml:"XMLName,omitempty"`
}

IDPSSODescriptor IDPSSODescriptor represents the SAML IDPSSODescriptorType object.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.3

swagger:model IDPSSODescriptor

func (*IDPSSODescriptor) ContextValidate ¶

func (m *IDPSSODescriptor) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this ID p s s o descriptor based on the context it is used

func (*IDPSSODescriptor) MarshalBinary ¶

func (m *IDPSSODescriptor) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IDPSSODescriptor) UnmarshalBinary ¶

func (m *IDPSSODescriptor) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IDPSSODescriptor) Validate ¶

func (m *IDPSSODescriptor) Validate(formats strfmt.Registry) error

Validate validates this ID p s s o descriptor

type IDPSSOSettings ¶

type IDPSSOSettings struct {

	// Opt this IDP out of workspace SSO enablement
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`
}

IDPSSOSettings ID p s s o settings

swagger:model IDPSSOSettings

func (*IDPSSOSettings) ContextValidate ¶

func (m *IDPSSOSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this ID p s s o settings based on context it is used

func (*IDPSSOSettings) MarshalBinary ¶

func (m *IDPSSOSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IDPSSOSettings) UnmarshalBinary ¶

func (m *IDPSSOSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IDPSSOSettings) Validate ¶

func (m *IDPSSOSettings) Validate(formats strfmt.Registry) error

Validate validates this ID p s s o settings

type IDPTokenExchangeSettings ¶

type IDPTokenExchangeSettings struct {

	// If enabled token issued by this IDP can be used for token exchange
	Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"`
}

IDPTokenExchangeSettings ID p token exchange settings

swagger:model IDPTokenExchangeSettings

func (*IDPTokenExchangeSettings) ContextValidate ¶

func (m *IDPTokenExchangeSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this ID p token exchange settings based on context it is used

func (*IDPTokenExchangeSettings) MarshalBinary ¶

func (m *IDPTokenExchangeSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IDPTokenExchangeSettings) UnmarshalBinary ¶

func (m *IDPTokenExchangeSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IDPTokenExchangeSettings) Validate ¶

func (m *IDPTokenExchangeSettings) Validate(formats strfmt.Registry) error

Validate validates this ID p token exchange settings

type IDPsResponse ¶

type IDPsResponse struct {

	// idps
	Idps []*IDPBase `json:"idps" yaml:"idps"`
}

IDPsResponse ID ps response

swagger:model IDPsResponse

func (*IDPsResponse) ContextValidate ¶

func (m *IDPsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this ID ps response based on the context it is used

func (*IDPsResponse) MarshalBinary ¶

func (m *IDPsResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IDPsResponse) UnmarshalBinary ¶

func (m *IDPsResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IDPsResponse) Validate ¶

func (m *IDPsResponse) Validate(formats strfmt.Registry) error

Validate validates this ID ps response

type IdentifierType ¶

type IdentifierType string

IdentifierType identifier type

swagger:model IdentifierType

func (IdentifierType) ContextValidate ¶

func (m IdentifierType) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this identifier type based on context it is used

func (IdentifierType) Validate ¶

func (m IdentifierType) Validate(formats strfmt.Registry) error

Validate validates this identifier type

type IdentityAssuranceConfiguration ¶

type IdentityAssuranceConfiguration struct {

	// JSON array containing all attachment types supported by the OP.  REQUIRED when OP supports attachments. Possible values are external and embedded.
	Attachments []string `json:"attachments" yaml:"attachments"`

	// claims in verified claims
	ClaimsInVerifiedClaims []string `json:"claims_in_verified_claims" yaml:"claims_in_verified_claims"`

	// REQUIRED when OP supports external attachments. JSON array containing all supported digest algorithms which can be used as alg property within
	// the digest object of external attachments. If the OP supports external attachments, at least the algorithm sha-256 MUST be supported by the OP as well.
	DigestAlgorithms []string `json:"digest_algorithms" yaml:"digest_algorithms"`

	// JSON array containing all identity document types utilized by the OP for identity verification. REQUIRED when evidence_supported contains "document".
	Documents []string `json:"documents" yaml:"documents"`

	// JSON array containing the check methods the OP supports for evidences of type "document".
	DocumentsCheckMethods []string `json:"documents_check_methods" yaml:"documents_check_methods"`

	// JSON array containing the methods the OP supports for evidences of type "document".
	DocumentsMethods []string `json:"documents_methods" yaml:"documents_methods"`

	// JSON array containing all electronic record types the OP supports. REQUIRED when evidence_supported contains "electronic_record".
	ElectronicRecords []string `json:"electronic_records" yaml:"electronic_records"`

	// Boolean value indicating support for verified_claims, i.e., the OpenID Connect for Identity Assurance extension.
	EnableVerifiedClaims bool `json:"enable_verified_claims,omitempty" yaml:"enable_verified_claims,omitempty"`

	// JSON array containing all types of identity evidence the OP uses.
	Evidence []string `json:"evidence" yaml:"evidence"`

	// JSON array containing all supported trust frameworks.
	TrustFrameworks []string `json:"trust_frameworks" yaml:"trust_frameworks"`
}

IdentityAssuranceConfiguration identity assurance configuration

swagger:model IdentityAssuranceConfiguration

func (*IdentityAssuranceConfiguration) ContextValidate ¶

func (m *IdentityAssuranceConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this identity assurance configuration based on context it is used

func (*IdentityAssuranceConfiguration) MarshalBinary ¶

func (m *IdentityAssuranceConfiguration) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IdentityAssuranceConfiguration) UnmarshalBinary ¶

func (m *IdentityAssuranceConfiguration) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IdentityAssuranceConfiguration) Validate ¶

func (m *IdentityAssuranceConfiguration) Validate(formats strfmt.Registry) error

Validate validates this identity assurance configuration

type IdentityPoolIDP ¶

type IdentityPoolIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

IdentityPoolIDP identity pool ID p

swagger:model IdentityPoolIDP

func (*IdentityPoolIDP) ContextValidate ¶

func (m *IdentityPoolIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this identity pool ID p based on the context it is used

func (*IdentityPoolIDP) MarshalBinary ¶

func (m *IdentityPoolIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IdentityPoolIDP) UnmarshalBinary ¶

func (m *IdentityPoolIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IdentityPoolIDP) Validate ¶

func (m *IdentityPoolIDP) Validate(formats strfmt.Registry) error

Validate validates this identity pool ID p

type IdentityPoolRoleSubject ¶

type IdentityPoolRoleSubject struct {

	// identity pool user pool id
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// identity pool user id
	IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"`

	// idp user idp id
	IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"`

	// roles
	Roles *IdentityPoolRoles `json:"roles,omitempty" yaml:"roles,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	// Enum: [identity_pool_user idp]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// idp user workspace id
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

IdentityPoolRoleSubject identity pool role subject

swagger:model IdentityPoolRoleSubject

func (*IdentityPoolRoleSubject) ContextValidate ¶

func (m *IdentityPoolRoleSubject) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this identity pool role subject based on the context it is used

func (*IdentityPoolRoleSubject) MarshalBinary ¶

func (m *IdentityPoolRoleSubject) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IdentityPoolRoleSubject) UnmarshalBinary ¶

func (m *IdentityPoolRoleSubject) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IdentityPoolRoleSubject) Validate ¶

func (m *IdentityPoolRoleSubject) Validate(formats strfmt.Registry) error

Validate validates this identity pool role subject

type IdentityPoolRoles ¶

type IdentityPoolRoles struct {

	// user manager
	UserManager bool `json:"user_manager,omitempty" yaml:"user_manager,omitempty"`
}

IdentityPoolRoles identity pool roles

swagger:model IdentityPoolRoles

func (*IdentityPoolRoles) ContextValidate ¶

func (m *IdentityPoolRoles) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this identity pool roles based on context it is used

func (*IdentityPoolRoles) MarshalBinary ¶

func (m *IdentityPoolRoles) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IdentityPoolRoles) UnmarshalBinary ¶

func (m *IdentityPoolRoles) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IdentityPoolRoles) Validate ¶

func (m *IdentityPoolRoles) Validate(formats strfmt.Registry) error

Validate validates this identity pool roles

type IdentityPoolRolesResponse ¶

type IdentityPoolRolesResponse struct {

	// subjects
	Subjects []*IdentityPoolRoleSubject `json:"subjects" yaml:"subjects"`
}

IdentityPoolRolesResponse identity pool roles response

swagger:model IdentityPoolRolesResponse

func (*IdentityPoolRolesResponse) ContextValidate ¶

func (m *IdentityPoolRolesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this identity pool roles response based on the context it is used

func (*IdentityPoolRolesResponse) MarshalBinary ¶

func (m *IdentityPoolRolesResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IdentityPoolRolesResponse) UnmarshalBinary ¶

func (m *IdentityPoolRolesResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IdentityPoolRolesResponse) Validate ¶

func (m *IdentityPoolRolesResponse) Validate(formats strfmt.Registry) error

Validate validates this identity pool roles response

type Image ¶

type Image struct {

	// url
	URL string `json:"url,omitempty" yaml:"url,omitempty"`
}

Image image

swagger:model Image

func (*Image) ContextValidate ¶

func (m *Image) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this image based on context it is used

func (*Image) MarshalBinary ¶

func (m *Image) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Image) UnmarshalBinary ¶

func (m *Image) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Image) Validate ¶

func (m *Image) Validate(formats strfmt.Registry) error

Validate validates this image

type Images ¶

type Images struct {

	// images
	Images []*Image `json:"images" yaml:"images"`
}

Images images

swagger:model Images

func (*Images) ContextValidate ¶

func (m *Images) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this images based on the context it is used

func (*Images) MarshalBinary ¶

func (m *Images) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Images) UnmarshalBinary ¶

func (m *Images) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Images) Validate ¶

func (m *Images) Validate(formats strfmt.Registry) error

Validate validates this images

type ImportServiceConfigurationResult ¶

type ImportServiceConfigurationResult struct {

	// Authorization server identifier
	// Example: my-server
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// created apis
	CreatedApis []*API `json:"created_apis" yaml:"created_apis"`

	// created policies
	CreatedPolicies []*Policy `json:"created_policies" yaml:"created_policies"`

	// created scopes
	CreatedScopes []*Scope `json:"created_scopes" yaml:"created_scopes"`

	// Custom service audience
	// Example: https://api.example.com
	CustomAudience string `json:"custom_audience,omitempty" yaml:"custom_audience,omitempty"`

	// Service description
	// Example: Service description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Gateway identifier
	// Example: gateway-1
	GatewayID string `json:"gateway_id,omitempty" yaml:"gateway_id,omitempty"`

	// A unique identifier of a service
	// Example: service-1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// Service name
	// Example: My service
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// not removed policies
	NotRemovedPolicies []*Policy `json:"not_removed_policies" yaml:"not_removed_policies"`

	// removed apis
	RemovedApis []*API `json:"removed_apis" yaml:"removed_apis"`

	// removed policies
	RemovedPolicies []*Policy `json:"removed_policies" yaml:"removed_policies"`

	// `true` when the service is a system service
	// Example: false
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// Tenant identifier
	// Example: my-company
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// Service type
	// Enum: [oauth2 oidc system user openbanking]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// The date of service update
	// Format: date-time
	UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"`

	// `true` when the service has the OpenAPI 3.0 specification
	WithSpecification bool `json:"with_specification,omitempty" yaml:"with_specification,omitempty"`
}

ImportServiceConfigurationResult import service configuration result

swagger:model ImportServiceConfigurationResult

func (*ImportServiceConfigurationResult) ContextValidate ¶

func (m *ImportServiceConfigurationResult) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this import service configuration result based on the context it is used

func (*ImportServiceConfigurationResult) MarshalBinary ¶

func (m *ImportServiceConfigurationResult) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ImportServiceConfigurationResult) UnmarshalBinary ¶

func (m *ImportServiceConfigurationResult) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ImportServiceConfigurationResult) Validate ¶

Validate validates this import service configuration result

type IndexedEndpoint ¶

type IndexedEndpoint struct {

	// binding
	Binding string `json:"Binding,omitempty" yaml:"Binding,omitempty"`

	// index
	Index int64 `json:"Index,omitempty" yaml:"Index,omitempty"`

	// is default
	IsDefault bool `json:"IsDefault,omitempty" yaml:"IsDefault,omitempty"`

	// location
	Location string `json:"Location,omitempty" yaml:"Location,omitempty"`

	// response location
	ResponseLocation string `json:"ResponseLocation,omitempty" yaml:"ResponseLocation,omitempty"`
}

IndexedEndpoint IndexedEndpoint represents the SAML IndexedEndpointType object.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.2.3

swagger:model IndexedEndpoint

func (*IndexedEndpoint) ContextValidate ¶

func (m *IndexedEndpoint) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this indexed endpoint based on context it is used

func (*IndexedEndpoint) MarshalBinary ¶

func (m *IndexedEndpoint) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IndexedEndpoint) UnmarshalBinary ¶

func (m *IndexedEndpoint) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IndexedEndpoint) Validate ¶

func (m *IndexedEndpoint) Validate(formats strfmt.Registry) error

Validate validates this indexed endpoint

type InitialAccessTokenSettings ¶

type InitialAccessTokenSettings struct {

	// Enables initial access token for dynamic client registration
	//
	// If enabled, the registration endpoint requires an access token with the dcr_register scope granted.
	// To issue the access token, you need a separate client with the client credentials grant type.
	// Upon successful registration, the access token is terminated.
	Required bool `json:"required,omitempty" yaml:"required,omitempty"`
}

InitialAccessTokenSettings initial access token settings

swagger:model InitialAccessTokenSettings

func (*InitialAccessTokenSettings) ContextValidate ¶

func (m *InitialAccessTokenSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this initial access token settings based on context it is used

func (*InitialAccessTokenSettings) MarshalBinary ¶

func (m *InitialAccessTokenSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*InitialAccessTokenSettings) UnmarshalBinary ¶

func (m *InitialAccessTokenSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*InitialAccessTokenSettings) Validate ¶

func (m *InitialAccessTokenSettings) Validate(formats strfmt.Registry) error

Validate validates this initial access token settings

type IntelliTrustCredentials ¶

type IntelliTrustCredentials struct {

	// OAuth client application secret from your Entrust Datacard® IntelliTrust™ Authentication
	// Service general settings
	ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"`
}

IntelliTrustCredentials IntelliTrust™ IDP specific credentials

swagger:model IntelliTrustCredentials

func (*IntelliTrustCredentials) ContextValidate ¶

func (m *IntelliTrustCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this intelli trust credentials based on context it is used

func (*IntelliTrustCredentials) MarshalBinary ¶

func (m *IntelliTrustCredentials) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IntelliTrustCredentials) UnmarshalBinary ¶

func (m *IntelliTrustCredentials) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IntelliTrustCredentials) Validate ¶

func (m *IntelliTrustCredentials) Validate(formats strfmt.Registry) error

Validate validates this intelli trust credentials

type IntelliTrustIDP ¶

type IntelliTrustIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// credentials
	Credentials *IntelliTrustCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// settings
	Settings *IntelliTrustSettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

IntelliTrustIDP intelli trust ID p

swagger:model IntelliTrustIDP

func (*IntelliTrustIDP) ContextValidate ¶

func (m *IntelliTrustIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this intelli trust ID p based on the context it is used

func (*IntelliTrustIDP) MarshalBinary ¶

func (m *IntelliTrustIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IntelliTrustIDP) UnmarshalBinary ¶

func (m *IntelliTrustIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IntelliTrustIDP) Validate ¶

func (m *IntelliTrustIDP) Validate(formats strfmt.Registry) error

Validate validates this intelli trust ID p

type IntelliTrustSettings ¶

type IntelliTrustSettings struct {

	// OAuth client application identifier from your Entrust Datacard® IntelliTrust™ Authentication
	// Service general settings
	// Example: client
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// String represented domain of the Entrust Datacard® IntelliTrust™ Authentication Service for your organization
	// Example: cloudentity-dev.us.trustedauth.com
	Domain string `json:"domain,omitempty" yaml:"domain,omitempty"`

	// If enabled, the groups a user belongs to are collected
	//
	// If you want to fetch groups from the IntelliTrust™ IDP, you need to add the `groups` claim
	// for your application on the IDP side.
	FetchGroups bool `json:"fetch_groups,omitempty" yaml:"fetch_groups,omitempty"`

	// If enabled, users' data is collected by calling the `userinfo` IntelliTrust™ endpoint.
	GetUserInfo bool `json:"get_user_info,omitempty" yaml:"get_user_info,omitempty"`

	// An array of additional scopes your client requests
	// Example: ["email","profile","openid"]
	Scopes []string `json:"scopes" yaml:"scopes"`

	// Whether to send the identifier as a `login_hint` parameter to the IDP
	SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"`
}

IntelliTrustSettings IntelliTrust™ IDP specific settings

swagger:model IntelliTrustSettings

func (*IntelliTrustSettings) ContextValidate ¶

func (m *IntelliTrustSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this intelli trust settings based on context it is used

func (*IntelliTrustSettings) MarshalBinary ¶

func (m *IntelliTrustSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*IntelliTrustSettings) UnmarshalBinary ¶

func (m *IntelliTrustSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*IntelliTrustSettings) Validate ¶

func (m *IntelliTrustSettings) Validate(formats strfmt.Registry) error

Validate validates this intelli trust settings

type Intermediary ¶

type Intermediary struct {

	// Array of strings representing ways to contact people responsible for this intermediary
	Contacts []string `json:"contacts" yaml:"contacts"`

	// A short description of the intermediary
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// A URL string that references a logo for this intermediary
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// Name of intermediary party
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Registry references for this intermediary
	RegistryReferences []*RegistryReference `json:"registry_references" yaml:"registry_references"`

	// A URL string of a web page providing information about the intermediary
	URI string `json:"uri,omitempty" yaml:"uri,omitempty"`
}

Intermediary intermediary

swagger:model Intermediary

func (*Intermediary) ContextValidate ¶

func (m *Intermediary) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this intermediary based on the context it is used

func (*Intermediary) MarshalBinary ¶

func (m *Intermediary) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Intermediary) UnmarshalBinary ¶

func (m *Intermediary) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Intermediary) Validate ¶

func (m *Intermediary) Validate(formats strfmt.Registry) error

Validate validates this intermediary

type JITAdressVerificationMode ¶

type JITAdressVerificationMode string

JITAdressVerificationMode j i t adress verification mode

swagger:model JITAdressVerificationMode

func (JITAdressVerificationMode) ContextValidate ¶

func (m JITAdressVerificationMode) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this j i t adress verification mode based on context it is used

func (JITAdressVerificationMode) Validate ¶

func (m JITAdressVerificationMode) Validate(formats strfmt.Registry) error

Validate validates this j i t adress verification mode

type JITCreatedPayload ¶

type JITCreatedPayload struct {

	// idp
	Idp *IDPPayload `json:"idp,omitempty" yaml:"idp,omitempty"`

	// pool id
	PoolID string `json:"pool_id,omitempty" yaml:"pool_id,omitempty"`

	// user id
	UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"`
}

JITCreatedPayload j i t created payload

swagger:model JITCreatedPayload

func (*JITCreatedPayload) ContextValidate ¶

func (m *JITCreatedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this j i t created payload based on the context it is used

func (*JITCreatedPayload) MarshalBinary ¶

func (m *JITCreatedPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*JITCreatedPayload) UnmarshalBinary ¶

func (m *JITCreatedPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*JITCreatedPayload) Validate ¶

func (m *JITCreatedPayload) Validate(formats strfmt.Registry) error

Validate validates this j i t created payload

type JITFailedPayload ¶

type JITFailedPayload struct {

	// error
	Error string `json:"error,omitempty" yaml:"error,omitempty"`

	// idp
	Idp *IDPPayload `json:"idp,omitempty" yaml:"idp,omitempty"`

	// idp sub
	IdpSub string `json:"idp_sub,omitempty" yaml:"idp_sub,omitempty"`

	// pool id
	PoolID string `json:"pool_id,omitempty" yaml:"pool_id,omitempty"`

	// user mapping
	UserMapping *JITUser `json:"user_mapping,omitempty" yaml:"user_mapping,omitempty"`

	// user to provision
	UserToProvision map[string]interface{} `json:"user_to_provision,omitempty" yaml:"user_to_provision,omitempty"`
}

JITFailedPayload j i t failed payload

swagger:model JITFailedPayload

func (*JITFailedPayload) ContextValidate ¶

func (m *JITFailedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this j i t failed payload based on the context it is used

func (*JITFailedPayload) MarshalBinary ¶

func (m *JITFailedPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*JITFailedPayload) UnmarshalBinary ¶

func (m *JITFailedPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*JITFailedPayload) Validate ¶

func (m *JITFailedPayload) Validate(formats strfmt.Registry) error

Validate validates this j i t failed payload

type JITProvisioning ¶

type JITProvisioning struct {

	// identifier salt
	IdentifierSalt string `json:"identifier_salt,omitempty" yaml:"identifier_salt,omitempty"`

	// mode
	Mode ProvisioningMode `json:"mode,omitempty" yaml:"mode,omitempty"`

	// pool id
	PoolID string `json:"pool_id,omitempty" yaml:"pool_id,omitempty"`

	// user
	User *JITUser `json:"user,omitempty" yaml:"user,omitempty"`
}

JITProvisioning j i t provisioning

swagger:model JITProvisioning

func (*JITProvisioning) ContextValidate ¶

func (m *JITProvisioning) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this j i t provisioning based on the context it is used

func (*JITProvisioning) MarshalBinary ¶

func (m *JITProvisioning) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*JITProvisioning) UnmarshalBinary ¶

func (m *JITProvisioning) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*JITProvisioning) Validate ¶

func (m *JITProvisioning) Validate(formats strfmt.Registry) error

Validate validates this j i t provisioning

type JITSettings ¶

type JITSettings struct {

	// enabled
	Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"`

	// provisioning
	Provisioning *JITProvisioning `json:"provisioning,omitempty" yaml:"provisioning,omitempty"`
}

JITSettings j i t settings

swagger:model JITSettings

func (*JITSettings) ContextValidate ¶

func (m *JITSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this j i t settings based on the context it is used

func (*JITSettings) MarshalBinary ¶

func (m *JITSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*JITSettings) UnmarshalBinary ¶

func (m *JITSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*JITSettings) Validate ¶

func (m *JITSettings) Validate(formats strfmt.Registry) error

Validate validates this j i t settings

type JITUpdatedPayload ¶

type JITUpdatedPayload struct {

	// idp
	Idp *IDPPayload `json:"idp,omitempty" yaml:"idp,omitempty"`

	// new account linked
	NewAccountLinked bool `json:"new_account_linked,omitempty" yaml:"new_account_linked,omitempty"`

	// pool id
	PoolID string `json:"pool_id,omitempty" yaml:"pool_id,omitempty"`

	// user id
	UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"`
}

JITUpdatedPayload j i t updated payload

swagger:model JITUpdatedPayload

func (*JITUpdatedPayload) ContextValidate ¶

func (m *JITUpdatedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this j i t updated payload based on the context it is used

func (*JITUpdatedPayload) MarshalBinary ¶

func (m *JITUpdatedPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*JITUpdatedPayload) UnmarshalBinary ¶

func (m *JITUpdatedPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*JITUpdatedPayload) Validate ¶

func (m *JITUpdatedPayload) Validate(formats strfmt.Registry) error

Validate validates this j i t updated payload

type JITUser ¶

type JITUser struct {

	// addresses
	Addresses []*JITUserAddress `json:"addresses" yaml:"addresses"`

	// attributes mapping
	AttributesMapping UserAttributesMapping `json:"attributes_mapping,omitempty" yaml:"attributes_mapping,omitempty"`

	// identifiers
	Identifiers []*JITUserIdentifier `json:"identifiers" yaml:"identifiers"`
}

JITUser j i t user

swagger:model JITUser

func (*JITUser) ContextValidate ¶

func (m *JITUser) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this j i t user based on the context it is used

func (*JITUser) MarshalBinary ¶

func (m *JITUser) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*JITUser) UnmarshalBinary ¶

func (m *JITUser) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*JITUser) Validate ¶

func (m *JITUser) Validate(formats strfmt.Registry) error

Validate validates this j i t user

type JITUserAddress ¶

type JITUserAddress struct {

	// source
	Source string `json:"source,omitempty" yaml:"source,omitempty"`

	// type
	Type IdentifierType `json:"type,omitempty" yaml:"type,omitempty"`

	// verification mode
	VerificationMode JITAdressVerificationMode `json:"verification_mode,omitempty" yaml:"verification_mode,omitempty"`
}

JITUserAddress j i t user address

swagger:model JITUserAddress

func (*JITUserAddress) ContextValidate ¶

func (m *JITUserAddress) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this j i t user address based on the context it is used

func (*JITUserAddress) MarshalBinary ¶

func (m *JITUserAddress) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*JITUserAddress) UnmarshalBinary ¶

func (m *JITUserAddress) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*JITUserAddress) Validate ¶

func (m *JITUserAddress) Validate(formats strfmt.Registry) error

Validate validates this j i t user address

type JITUserIdentifier ¶

type JITUserIdentifier struct {

	// source
	Source string `json:"source,omitempty" yaml:"source,omitempty"`

	// type
	Type IdentifierType `json:"type,omitempty" yaml:"type,omitempty"`
}

JITUserIdentifier j i t user identifier

swagger:model JITUserIdentifier

func (*JITUserIdentifier) ContextValidate ¶

func (m *JITUserIdentifier) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this j i t user identifier based on the context it is used

func (*JITUserIdentifier) MarshalBinary ¶

func (m *JITUserIdentifier) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*JITUserIdentifier) UnmarshalBinary ¶

func (m *JITUserIdentifier) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*JITUserIdentifier) Validate ¶

func (m *JITUserIdentifier) Validate(formats strfmt.Registry) error

Validate validates this j i t user identifier

type JWSPayloadSettings ¶

type JWSPayloadSettings struct {

	// jwks
	Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"`

	// URI of the JWKs of the trusted party responsible for signing request body
	JwksURI string `json:"jwks_uri,omitempty" yaml:"jwks_uri,omitempty"`

	// JWK source - defines where are the keys for validating dcr request signature
	// Keys can be defined at server level or can be taken from jwks_uri claim from the software statement sent by the client
	Source string `json:"source,omitempty" yaml:"source,omitempty"`
}

JWSPayloadSettings j w s payload settings

swagger:model JWSPayloadSettings

func (*JWSPayloadSettings) ContextValidate ¶

func (m *JWSPayloadSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this j w s payload settings based on the context it is used

func (*JWSPayloadSettings) MarshalBinary ¶

func (m *JWSPayloadSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*JWSPayloadSettings) UnmarshalBinary ¶

func (m *JWSPayloadSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*JWSPayloadSettings) Validate ¶

func (m *JWSPayloadSettings) Validate(formats strfmt.Registry) error

Validate validates this j w s payload settings

type JwtClaims ¶

type JwtClaims map[string]interface{}

JwtClaims jwt claims

swagger:model JwtClaims

func (JwtClaims) ContextValidate ¶

func (m JwtClaims) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this jwt claims based on context it is used

func (JwtClaims) Validate ¶

func (m JwtClaims) Validate(formats strfmt.Registry) error

Validate validates this jwt claims

type KeyDescriptor ¶

type KeyDescriptor struct {

	// encryption methods
	EncryptionMethods []*EncryptionMethod `json:"EncryptionMethods" yaml:"EncryptionMethods"`

	// key info
	KeyInfo *KeyInfo `json:"KeyInfo,omitempty" yaml:"KeyInfo,omitempty"`

	// use
	Use string `json:"Use,omitempty" yaml:"Use,omitempty"`
}

KeyDescriptor KeyDescriptor represents the XMLSEC object of the same name

swagger:model KeyDescriptor

func (*KeyDescriptor) ContextValidate ¶

func (m *KeyDescriptor) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this key descriptor based on the context it is used

func (*KeyDescriptor) MarshalBinary ¶

func (m *KeyDescriptor) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*KeyDescriptor) UnmarshalBinary ¶

func (m *KeyDescriptor) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*KeyDescriptor) Validate ¶

func (m *KeyDescriptor) Validate(formats strfmt.Registry) error

Validate validates this key descriptor

type KeyInfo ¶

type KeyInfo struct {

	// x509 data
	X509Data *X509Data `json:"X509Data,omitempty" yaml:"X509Data,omitempty"`

	// XML name
	XMLName *Name `json:"XMLName,omitempty" yaml:"XMLName,omitempty"`
}

KeyInfo KeyInfo represents the XMLSEC object of the same name

swagger:model KeyInfo

func (*KeyInfo) ContextValidate ¶

func (m *KeyInfo) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this key info based on the context it is used

func (*KeyInfo) MarshalBinary ¶

func (m *KeyInfo) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*KeyInfo) UnmarshalBinary ¶

func (m *KeyInfo) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*KeyInfo) Validate ¶

func (m *KeyInfo) Validate(formats strfmt.Registry) error

Validate validates this key info

type KeysResponse ¶

type KeysResponse struct {

	// current key
	CurrentKey *ServerJWK `json:"current_key,omitempty" yaml:"current_key,omitempty"`

	// next key
	NextKey *ServerJWK `json:"next_key,omitempty" yaml:"next_key,omitempty"`

	// revoked keys
	RevokedKeys []*ServerJWK `json:"revoked_keys" yaml:"revoked_keys"`

	// rotated keys
	RotatedKeys []*ServerJWK `json:"rotated_keys" yaml:"rotated_keys"`
}

KeysResponse keys response

swagger:model KeysResponse

func (*KeysResponse) ContextValidate ¶

func (m *KeysResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this keys response based on the context it is used

func (*KeysResponse) MarshalBinary ¶

func (m *KeysResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*KeysResponse) UnmarshalBinary ¶

func (m *KeysResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*KeysResponse) Validate ¶

func (m *KeysResponse) Validate(formats strfmt.Registry) error

Validate validates this keys response

type LegalEntity ¶

type LegalEntity struct {

	// party
	Party *FDXParty `json:"party,omitempty" yaml:"party,omitempty"`
}

LegalEntity legal entity

swagger:model LegalEntity

func (*LegalEntity) ContextValidate ¶

func (m *LegalEntity) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this legal entity based on the context it is used

func (*LegalEntity) MarshalBinary ¶

func (m *LegalEntity) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*LegalEntity) UnmarshalBinary ¶

func (m *LegalEntity) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*LegalEntity) Validate ¶

func (m *LegalEntity) Validate(formats strfmt.Registry) error

Validate validates this legal entity

type License ¶

type License struct {

	// License expiration date
	// Example: 2023-03-01T09:02:27.127932Z
	// Format: date-time
	ExpirationDate strfmt.DateTime `json:"expiration_date,omitempty" yaml:"expiration_date,omitempty"`

	// Type of license
	// Example: trial
	// Enum: [trial enterprise]
	LicenseType string `json:"license_type,omitempty" yaml:"license_type,omitempty"`

	// License start date
	// Example: 2023-03-01T09:02:27.127932Z
	// Format: date-time
	StartTime strfmt.DateTime `json:"start_time,omitempty" yaml:"start_time,omitempty"`
}

License license

swagger:model License

func (*License) ContextValidate ¶

func (m *License) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this license based on context it is used

func (*License) MarshalBinary ¶

func (m *License) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*License) UnmarshalBinary ¶

func (m *License) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*License) Validate ¶

func (m *License) Validate(formats strfmt.Registry) error

Validate validates this license

type LocalizedName ¶

type LocalizedName struct {

	// lang
	Lang string `json:"Lang,omitempty" yaml:"Lang,omitempty"`

	// value
	Value string `json:"Value,omitempty" yaml:"Value,omitempty"`
}

LocalizedName LocalizedName represents the SAML type localizedNameType.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.2.4

swagger:model LocalizedName

func (*LocalizedName) ContextValidate ¶

func (m *LocalizedName) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this localized name based on context it is used

func (*LocalizedName) MarshalBinary ¶

func (m *LocalizedName) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*LocalizedName) UnmarshalBinary ¶

func (m *LocalizedName) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*LocalizedName) Validate ¶

func (m *LocalizedName) Validate(formats strfmt.Registry) error

Validate validates this localized name

type LocalizedURI ¶

type LocalizedURI struct {

	// lang
	Lang string `json:"Lang,omitempty" yaml:"Lang,omitempty"`

	// value
	Value string `json:"Value,omitempty" yaml:"Value,omitempty"`
}

LocalizedURI LocalizedURI represents the SAML type localizedURIType.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.2.5

swagger:model LocalizedURI

func (*LocalizedURI) ContextValidate ¶

func (m *LocalizedURI) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this localized URI based on context it is used

func (*LocalizedURI) MarshalBinary ¶

func (m *LocalizedURI) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*LocalizedURI) UnmarshalBinary ¶

func (m *LocalizedURI) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*LocalizedURI) Validate ¶

func (m *LocalizedURI) Validate(formats strfmt.Registry) error

Validate validates this localized URI

type LoginFailedPayload ¶

type LoginFailedPayload struct {

	// cause
	Cause string `json:"cause,omitempty" yaml:"cause,omitempty"`

	// error
	Error string `json:"error,omitempty" yaml:"error,omitempty"`

	// error description
	ErrorDescription string `json:"error_description,omitempty" yaml:"error_description,omitempty"`

	// error hint
	ErrorHint string `json:"error_hint,omitempty" yaml:"error_hint,omitempty"`

	// idp
	Idp *IDPPayload `json:"idp,omitempty" yaml:"idp,omitempty"`

	// status code
	StatusCode int64 `json:"status_code,omitempty" yaml:"status_code,omitempty"`
}

LoginFailedPayload login failed payload

swagger:model LoginFailedPayload

func (*LoginFailedPayload) ContextValidate ¶

func (m *LoginFailedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this login failed payload based on the context it is used

func (*LoginFailedPayload) MarshalBinary ¶

func (m *LoginFailedPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*LoginFailedPayload) UnmarshalBinary ¶

func (m *LoginFailedPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*LoginFailedPayload) Validate ¶

func (m *LoginFailedPayload) Validate(formats strfmt.Registry) error

Validate validates this login failed payload

type LoginPayload ¶

type LoginPayload struct {

	// idp
	Idp *IDPPayload `json:"idp,omitempty" yaml:"idp,omitempty"`
}

LoginPayload login payload

swagger:model LoginPayload

func (*LoginPayload) ContextValidate ¶

func (m *LoginPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this login payload based on the context it is used

func (*LoginPayload) MarshalBinary ¶

func (m *LoginPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*LoginPayload) UnmarshalBinary ¶

func (m *LoginPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*LoginPayload) Validate ¶

func (m *LoginPayload) Validate(formats strfmt.Registry) error

Validate validates this login payload

type MFAAuth ¶

type MFAAuth struct {

	// email
	Email *EmailAuth `json:"email,omitempty" yaml:"email,omitempty"`

	// sms
	Sms *SMSAuth `json:"sms,omitempty" yaml:"sms,omitempty"`
}

MFAAuth m f a auth

swagger:model MFAAuth

func (*MFAAuth) ContextValidate ¶

func (m *MFAAuth) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this m f a auth based on the context it is used

func (*MFAAuth) MarshalBinary ¶

func (m *MFAAuth) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*MFAAuth) UnmarshalBinary ¶

func (m *MFAAuth) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*MFAAuth) Validate ¶

func (m *MFAAuth) Validate(formats strfmt.Registry) error

Validate validates this m f a auth

type MFAMethod ¶

type MFAMethod struct {

	// auth
	Auth *MFAAuth `json:"auth,omitempty" yaml:"auth,omitempty"`

	// enabled
	// Required: true
	Enabled bool `json:"enabled" yaml:"enabled"`

	// id
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// mechanism
	// Example: email
	// Required: true
	// Enum: [sms email]
	Mechanism string `json:"mechanism" yaml:"mechanism"`

	// settings
	Settings *MFASettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// tenant id
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`
}

MFAMethod m f a method

swagger:model MFAMethod

func (*MFAMethod) ContextValidate ¶

func (m *MFAMethod) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this m f a method based on the context it is used

func (*MFAMethod) MarshalBinary ¶

func (m *MFAMethod) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*MFAMethod) UnmarshalBinary ¶

func (m *MFAMethod) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*MFAMethod) Validate ¶

func (m *MFAMethod) Validate(formats strfmt.Registry) error

Validate validates this m f a method

type MFAMethodResponse ¶

type MFAMethodResponse struct {

	// auth
	Auth *MFAAuth `json:"auth,omitempty" yaml:"auth,omitempty"`

	// default email settings
	DefaultEmailSettings *DefaultEmailSettings `json:"default_email_settings,omitempty" yaml:"default_email_settings,omitempty"`

	// default sms settings
	DefaultSmsSettings *DefaultSMSSettings `json:"default_sms_settings,omitempty" yaml:"default_sms_settings,omitempty"`

	// enabled
	// Required: true
	Enabled bool `json:"enabled" yaml:"enabled"`

	// id
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// mechanism
	// Example: email
	// Required: true
	// Enum: [sms email]
	Mechanism string `json:"mechanism" yaml:"mechanism"`

	// settings
	Settings *MFASettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// tenant id
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`
}

MFAMethodResponse m f a method response

swagger:model MFAMethodResponse

func (*MFAMethodResponse) ContextValidate ¶

func (m *MFAMethodResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this m f a method response based on the context it is used

func (*MFAMethodResponse) MarshalBinary ¶

func (m *MFAMethodResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*MFAMethodResponse) UnmarshalBinary ¶

func (m *MFAMethodResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*MFAMethodResponse) Validate ¶

func (m *MFAMethodResponse) Validate(formats strfmt.Registry) error

Validate validates this m f a method response

type MFAMethods ¶

type MFAMethods struct {

	// mfa methods
	MfaMethods []*MFAMethod `json:"mfa_methods" yaml:"mfa_methods"`
}

MFAMethods m f a methods

swagger:model MFAMethods

func (*MFAMethods) ContextValidate ¶

func (m *MFAMethods) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this m f a methods based on the context it is used

func (*MFAMethods) MarshalBinary ¶

func (m *MFAMethods) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*MFAMethods) UnmarshalBinary ¶

func (m *MFAMethods) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*MFAMethods) Validate ¶

func (m *MFAMethods) Validate(formats strfmt.Registry) error

Validate validates this m f a methods

type MFASettings ¶

type MFASettings struct {

	// email
	Email *EmailSettings `json:"email,omitempty" yaml:"email,omitempty"`

	// sms
	Sms *SMSSettings `json:"sms,omitempty" yaml:"sms,omitempty"`
}

MFASettings m f a settings

swagger:model MFASettings

func (*MFASettings) ContextValidate ¶

func (m *MFASettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this m f a settings based on the context it is used

func (*MFASettings) MarshalBinary ¶

func (m *MFASettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*MFASettings) UnmarshalBinary ¶

func (m *MFASettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*MFASettings) Validate ¶

func (m *MFASettings) Validate(formats strfmt.Registry) error

Validate validates this m f a settings

type Mapping ¶

type Mapping struct {

	// If enabled, the decoder makes the following "weak" conversions:
	//
	// Bools to string (true = "1", false = "0")
	//
	// numbers to string (base 10)
	//
	// bools to int/uint (true = 1, false = 0)
	//
	// strings to int/uint (base implied by prefix)
	//
	// int to bool (true if value != 0)
	//
	// string to bool (accepts only the following: 1, t, T, TRUE, true, True, 0, f, F, FALSE, false, False)
	//
	// empty array = empty map and vice versa
	//
	// negative numbers to overflowed uint values (base 10)
	//
	// slice of maps to a merged map
	//
	// single values are converted to slices if required. Each element is weakly decoded.
	// Example: false
	AllowWeakDecoding bool `json:"allow_weak_decoding,omitempty" yaml:"allow_weak_decoding,omitempty"`

	// mode
	Mode MappingMode `json:"mode,omitempty" yaml:"mode,omitempty"`

	// Source attribute.
	//
	// Source path to the attribute(s) which should be copied to the authentication context.
	// Use '.' to copy everything.
	// Required for dynamic mode.
	// Example: access_token
	Source string `json:"source,omitempty" yaml:"source,omitempty"`

	// When static mode is used, this field contains a value that will be populated into a target attribute.
	Static interface{} `json:"static,omitempty" yaml:"static,omitempty"`

	// Target attribute.
	//
	// Target path in the authentication context where source attribute(s) should be pasted.
	// Use '.' to paste to the context top level object.
	// Example: .
	// Required: true
	Target string `json:"target" yaml:"target"`

	// Type of the target attribute
	//
	// The `type` parameter accepts the following values:
	// `number`, `string`, `bool`, `number_array`, `string_array`, `bool_array`, `any`.
	// Example: string
	// Required: true
	Type string `json:"type" yaml:"type"`
}

Mapping Attribute mapping.

Source and target must be provided.

swagger:model Mapping

func (*Mapping) ContextValidate ¶

func (m *Mapping) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this mapping based on the context it is used

func (*Mapping) MarshalBinary ¶

func (m *Mapping) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Mapping) UnmarshalBinary ¶

func (m *Mapping) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Mapping) Validate ¶

func (m *Mapping) Validate(formats strfmt.Registry) error

Validate validates this mapping

type MappingMode ¶

type MappingMode string

MappingMode mapping mode

swagger:model MappingMode

func (MappingMode) ContextValidate ¶

func (m MappingMode) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this mapping mode based on context it is used

func (MappingMode) Validate ¶

func (m MappingMode) Validate(formats strfmt.Registry) error

Validate validates this mapping mode

type Mappings ¶

type Mappings []*Mapping

Mappings An array of mappings

Mapping is used to unify attributes from external IDPs and propagate them to the authentication context to be used later on. By mapping your authentication context attributes, you unify attributes from all IDPs that your users authenticate with. It allows you to use a set of unified attributes throughout ACP for multiple purposes.

swagger:model Mappings

func (Mappings) ContextValidate ¶

func (m Mappings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this mappings based on the context it is used

func (Mappings) Validate ¶

func (m Mappings) Validate(formats strfmt.Registry) error

Validate validates this mappings

type Metadata ¶

type Metadata map[string]interface{}

Metadata metadata

swagger:model Metadata

func (Metadata) ContextValidate ¶

func (m Metadata) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this metadata based on context it is used

func (Metadata) Validate ¶

func (m Metadata) Validate(formats strfmt.Registry) error

Validate validates this metadata

type Name ¶

type Name struct {

	// space
	Space string `json:"Space,omitempty" yaml:"Space,omitempty"`
}

Name A Name represents an XML name (Local) annotated with a name space identifier (Space). In tokens returned by Decoder.Token, the Space identifier is given as a canonical URL, not the short prefix used in the document being parsed.

swagger:model Name

func (*Name) ContextValidate ¶

func (m *Name) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this name based on context it is used

func (*Name) MarshalBinary ¶

func (m *Name) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Name) UnmarshalBinary ¶

func (m *Name) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Name) Validate ¶

func (m *Name) Validate(formats strfmt.Registry) error

Validate validates this name

type NameID ¶

type NameID struct {

	// format
	Format string `json:"Format,omitempty" yaml:"Format,omitempty"`

	// name qualifier
	NameQualifier string `json:"NameQualifier,omitempty" yaml:"NameQualifier,omitempty"`

	// s p name qualifier
	SPNameQualifier string `json:"SPNameQualifier,omitempty" yaml:"SPNameQualifier,omitempty"`

	// s p provided ID
	SPProvidedID string `json:"SPProvidedID,omitempty" yaml:"SPProvidedID,omitempty"`

	// value
	Value string `json:"Value,omitempty" yaml:"Value,omitempty"`
}

NameID NameID represents the SAML element NameID.

See http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf §2.2.3

swagger:model NameID

func (*NameID) ContextValidate ¶

func (m *NameID) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this name ID based on context it is used

func (*NameID) MarshalBinary ¶

func (m *NameID) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*NameID) UnmarshalBinary ¶

func (m *NameID) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*NameID) Validate ¶

func (m *NameID) Validate(formats strfmt.Registry) error

Validate validates this name ID

type NameIDFormat ¶

type NameIDFormat string

NameIDFormat NameIDFormat is the format of the id

swagger:model NameIDFormat

func (NameIDFormat) ContextValidate ¶

func (m NameIDFormat) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this name ID format based on context it is used

func (NameIDFormat) Validate ¶

func (m NameIDFormat) Validate(formats strfmt.Registry) error

Validate validates this name ID format

type OBBRConfiguration ¶

type OBBRConfiguration struct {

	// industry
	Industry OBBRIndustry `json:"industry,omitempty" yaml:"industry,omitempty"`
}

OBBRConfiguration o b b r configuration

swagger:model OBBRConfiguration

func (*OBBRConfiguration) ContextValidate ¶

func (m *OBBRConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this o b b r configuration based on the context it is used

func (*OBBRConfiguration) MarshalBinary ¶

func (m *OBBRConfiguration) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OBBRConfiguration) UnmarshalBinary ¶

func (m *OBBRConfiguration) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OBBRConfiguration) Validate ¶

func (m *OBBRConfiguration) Validate(formats strfmt.Registry) error

Validate validates this o b b r configuration

type OBBRIndustry ¶

type OBBRIndustry string

OBBRIndustry o b b r industry

swagger:model OBBRIndustry

func (OBBRIndustry) ContextValidate ¶

func (m OBBRIndustry) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this o b b r industry based on context it is used

func (OBBRIndustry) Validate ¶

func (m OBBRIndustry) Validate(formats strfmt.Registry) error

Validate validates this o b b r industry

type OBBRMetadata ¶

type OBBRMetadata struct {

	// An array of hosts subscribed to Open Finance Webhook Notifications
	WebhookUris []string `json:"webhook_uris" yaml:"webhook_uris"`
}

OBBRMetadata o b b r metadata

swagger:model OBBRMetadata

func (*OBBRMetadata) ContextValidate ¶

func (m *OBBRMetadata) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this o b b r metadata based on context it is used

func (*OBBRMetadata) MarshalBinary ¶

func (m *OBBRMetadata) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OBBRMetadata) UnmarshalBinary ¶

func (m *OBBRMetadata) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OBBRMetadata) Validate ¶

func (m *OBBRMetadata) Validate(formats strfmt.Registry) error

Validate validates this o b b r metadata

type OIDCCredentials ¶

type OIDCCredentials struct {

	// OAuth client application secret
	ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"`

	// private key jwt
	PrivateKeyJwt *PrivateKeyJWTCredentials `json:"private_key_jwt,omitempty" yaml:"private_key_jwt,omitempty"`
}

OIDCCredentials OIDC IDP specific credentials

swagger:model OIDCCredentials

func (*OIDCCredentials) ContextValidate ¶

func (m *OIDCCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this o ID c credentials based on the context it is used

func (*OIDCCredentials) MarshalBinary ¶

func (m *OIDCCredentials) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OIDCCredentials) UnmarshalBinary ¶

func (m *OIDCCredentials) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OIDCCredentials) Validate ¶

func (m *OIDCCredentials) Validate(formats strfmt.Registry) error

Validate validates this o ID c credentials

type OIDCIDP ¶

type OIDCIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// credentials
	Credentials *OIDCCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// settings
	Settings *OIDCSettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

OIDCIDP o ID c ID p

swagger:model OIDCIDP

func (*OIDCIDP) ContextValidate ¶

func (m *OIDCIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this o ID c ID p based on the context it is used

func (*OIDCIDP) MarshalBinary ¶

func (m *OIDCIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OIDCIDP) UnmarshalBinary ¶

func (m *OIDCIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OIDCIDP) Validate ¶

func (m *OIDCIDP) Validate(formats strfmt.Registry) error

Validate validates this o ID c ID p

type OIDCServerConsent ¶

type OIDCServerConsent interface{}

OIDCServerConsent o ID c server consent

swagger:model OIDCServerConsent

type OIDCSettings ¶

type OIDCSettings struct {

	// Client authentication method
	// Enum: [client_secret private_key_jwt]
	AuthenticationMethod string `json:"authentication_method,omitempty" yaml:"authentication_method,omitempty"`

	// OAuth client application identifier
	// Example: client
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// If enabled, users' data is collected by calling the `userinfo` endpoint.
	GetUserInfo bool `json:"get_user_info,omitempty" yaml:"get_user_info,omitempty"`

	// URL used to define the {baseURL} for any OpenID Connect endpoint when authorizing against ACP.
	IssuerURL string `json:"issuer_url,omitempty" yaml:"issuer_url,omitempty"`

	// An array of additional scopes your client requests
	// Example: ["email","profile","openid"]
	Scopes []string `json:"scopes" yaml:"scopes"`

	// Whether to send the identifier as a `login_hint` parameter to the IDP
	SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"`
}

OIDCSettings OIDC IDP specific settings

swagger:model OIDCSettings

func (*OIDCSettings) ContextValidate ¶

func (m *OIDCSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this o ID c settings based on context it is used

func (*OIDCSettings) MarshalBinary ¶

func (m *OIDCSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OIDCSettings) UnmarshalBinary ¶

func (m *OIDCSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OIDCSettings) Validate ¶

func (m *OIDCSettings) Validate(formats strfmt.Registry) error

Validate validates this o ID c settings

type OTPConfiguration ¶

type OTPConfiguration struct {

	// The maximum time one-time code is valid.
	// Example: 5m
	// Required: true
	// Format: duration
	Expiration strfmt.Duration `json:"expiration" yaml:"expiration"`

	// The number of characters for one-time code.
	// Example: 6
	// Required: true
	// Maximum: 10
	// Minimum: 4
	Length int64 `json:"length" yaml:"length"`
}

OTPConfiguration o t p configuration

swagger:model OTPConfiguration

func (*OTPConfiguration) ContextValidate ¶

func (m *OTPConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this o t p configuration based on context it is used

func (*OTPConfiguration) MarshalBinary ¶

func (m *OTPConfiguration) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OTPConfiguration) UnmarshalBinary ¶

func (m *OTPConfiguration) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OTPConfiguration) Validate ¶

func (m *OTPConfiguration) Validate(formats strfmt.Registry) error

Validate validates this o t p configuration

type OTPPayload ¶

type OTPPayload struct {

	// address
	Address string `json:"address,omitempty" yaml:"address,omitempty"`

	// purpose
	Purpose string `json:"purpose,omitempty" yaml:"purpose,omitempty"`

	// type
	// Enum: [sms email]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

OTPPayload o t p payload

swagger:model OTPPayload

func (*OTPPayload) ContextValidate ¶

func (m *OTPPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this o t p payload based on context it is used

func (*OTPPayload) MarshalBinary ¶

func (m *OTPPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OTPPayload) UnmarshalBinary ¶

func (m *OTPPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OTPPayload) Validate ¶

func (m *OTPPayload) Validate(formats strfmt.Registry) error

Validate validates this o t p payload

type OktaCredentials ¶

type OktaCredentials struct {

	// supervisor client
	SupervisorClient *OktaSupervisorClient `json:"supervisor_client,omitempty" yaml:"supervisor_client,omitempty"`
}

OktaCredentials Okta IDP specific credentials

swagger:model OktaCredentials

func (*OktaCredentials) ContextValidate ¶

func (m *OktaCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this okta credentials based on the context it is used

func (*OktaCredentials) MarshalBinary ¶

func (m *OktaCredentials) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OktaCredentials) UnmarshalBinary ¶

func (m *OktaCredentials) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OktaCredentials) Validate ¶

func (m *OktaCredentials) Validate(formats strfmt.Registry) error

Validate validates this okta credentials

type OktaIDP ¶

type OktaIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// credentials
	Credentials *OktaCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// settings
	Settings *OktaSettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

OktaIDP okta ID p

swagger:model OktaIDP

func (*OktaIDP) ContextValidate ¶

func (m *OktaIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this okta ID p based on the context it is used

func (*OktaIDP) MarshalBinary ¶

func (m *OktaIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OktaIDP) UnmarshalBinary ¶

func (m *OktaIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OktaIDP) Validate ¶

func (m *OktaIDP) Validate(formats strfmt.Registry) error

Validate validates this okta ID p

type OktaSettings ¶

type OktaSettings struct {

	// ID of a custom authorization server
	//
	// If the `use_org_authorization_server` parameter is set to `false`, use this field to specify
	// the ID of a custom authorization server.
	//
	// If not provided, the `default` value is used.
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// String represented domain of the Okta Authentication Service for your organization
	// Example: dev-316761.okta.com
	Domain string `json:"domain,omitempty" yaml:"domain,omitempty"`

	// If enabled, users' data is collected by calling the `userinfo` endpoint.
	GetUserInfo bool `json:"get_user_info,omitempty" yaml:"get_user_info,omitempty"`

	// An array of additional scopes your client requests
	Scopes []string `json:"scopes" yaml:"scopes"`

	// Whether to send the identifier as a `login_hint` parameter to the IDP
	SendLoginHint bool `json:"send_login_hint,omitempty" yaml:"send_login_hint,omitempty"`

	// If set to `true`, the built-in authorization server is used
	UseOrgAuthorizationServer bool `json:"use_org_authorization_server,omitempty" yaml:"use_org_authorization_server,omitempty"`
}

OktaSettings Okta IDP specific settings

swagger:model OktaSettings

func (*OktaSettings) ContextValidate ¶

func (m *OktaSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this okta settings based on context it is used

func (*OktaSettings) MarshalBinary ¶

func (m *OktaSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OktaSettings) UnmarshalBinary ¶

func (m *OktaSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OktaSettings) Validate ¶

func (m *OktaSettings) Validate(formats strfmt.Registry) error

Validate validates this okta settings

type OktaSupervisorClient ¶

type OktaSupervisorClient struct {

	// client id
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// client private key
	PrivateKey string `json:"private_key,omitempty" yaml:"private_key,omitempty"`
}

OktaSupervisorClient The `supervisor_client` parameter holds credentials for Okta's OAuth client application that are used to authorize to Okta to be able to create new client applications.

swagger:model OktaSupervisorClient

func (*OktaSupervisorClient) ContextValidate ¶

func (m *OktaSupervisorClient) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this okta supervisor client based on context it is used

func (*OktaSupervisorClient) MarshalBinary ¶

func (m *OktaSupervisorClient) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OktaSupervisorClient) UnmarshalBinary ¶

func (m *OktaSupervisorClient) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OktaSupervisorClient) Validate ¶

func (m *OktaSupervisorClient) Validate(formats strfmt.Registry) error

Validate validates this okta supervisor client

type OpenbankingServerConsent ¶

type OpenbankingServerConsent struct {

	// If empty it defaults to demo bank embedded in acp
	BankURL string `json:"bank_url,omitempty" yaml:"bank_url,omitempty"`
}

OpenbankingServerConsent openbanking server consent

swagger:model OpenbankingServerConsent

func (*OpenbankingServerConsent) ContextValidate ¶

func (m *OpenbankingServerConsent) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this openbanking server consent based on context it is used

func (*OpenbankingServerConsent) MarshalBinary ¶

func (m *OpenbankingServerConsent) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OpenbankingServerConsent) UnmarshalBinary ¶

func (m *OpenbankingServerConsent) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OpenbankingServerConsent) Validate ¶

func (m *OpenbankingServerConsent) Validate(formats strfmt.Registry) error

Validate validates this openbanking server consent

type Org ¶

type Org struct {

	// Your organization's label color in a HEX format.
	// Example: #007FFF
	Color string `json:"color,omitempty" yaml:"color,omitempty"`

	// Display description of the organization
	// Example: Organization description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// An array of email domains configured for an organization for the purposes of IDP discovery
	Domains []string `json:"domains" yaml:"domains"`

	// Unique identifier of an organization
	//
	// If not provided, a random ID is generated.
	// Example: default
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// metadata
	Metadata *ServerMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// Display name of the organization
	// Example: default
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// If true this organization can be used as a template when creating a new ones.
	Template bool `json:"template,omitempty" yaml:"template,omitempty"`
}

Org org

swagger:model Org

func (*Org) ContextValidate ¶

func (m *Org) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this org based on the context it is used

func (*Org) MarshalBinary ¶

func (m *Org) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Org) UnmarshalBinary ¶

func (m *Org) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Org) Validate ¶

func (m *Org) Validate(formats strfmt.Registry) error

Validate validates this org

type Organization ¶

type Organization struct {

	// organization display names
	OrganizationDisplayNames []*LocalizedName `json:"OrganizationDisplayNames" yaml:"OrganizationDisplayNames"`

	// organization names
	OrganizationNames []*LocalizedName `json:"OrganizationNames" yaml:"OrganizationNames"`

	// organization u r ls
	OrganizationURLs []*LocalizedURI `json:"OrganizationURLs" yaml:"OrganizationURLs"`
}

Organization Organization represents the SAML Organization object.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.3.2.1

swagger:model Organization

func (*Organization) ContextValidate ¶

func (m *Organization) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this organization based on the context it is used

func (*Organization) MarshalBinary ¶

func (m *Organization) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Organization) UnmarshalBinary ¶

func (m *Organization) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Organization) Validate ¶

func (m *Organization) Validate(formats strfmt.Registry) error

Validate validates this organization

type OrganizationConfiguration ¶

type OrganizationConfiguration struct {

	// An array of email domains configured for an organization for the purposes of IDP discovery
	Domains []string `json:"domains" yaml:"domains"`
}

OrganizationConfiguration organization configuration

swagger:model OrganizationConfiguration

func (*OrganizationConfiguration) ContextValidate ¶

func (m *OrganizationConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this organization configuration based on context it is used

func (*OrganizationConfiguration) MarshalBinary ¶

func (m *OrganizationConfiguration) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OrganizationConfiguration) UnmarshalBinary ¶

func (m *OrganizationConfiguration) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OrganizationConfiguration) Validate ¶

func (m *OrganizationConfiguration) Validate(formats strfmt.Registry) error

Validate validates this organization configuration

type OrganizationIDP ¶

type OrganizationIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

OrganizationIDP organization ID p

swagger:model OrganizationIDP

func (*OrganizationIDP) ContextValidate ¶

func (m *OrganizationIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this organization ID p based on the context it is used

func (*OrganizationIDP) MarshalBinary ¶

func (m *OrganizationIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OrganizationIDP) UnmarshalBinary ¶

func (m *OrganizationIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OrganizationIDP) Validate ¶

func (m *OrganizationIDP) Validate(formats strfmt.Registry) error

Validate validates this organization ID p

type OrganizationResponse ¶

type OrganizationResponse struct {

	// Your organization's label color in a HEX format.
	// Example: #007FFF
	Color string `json:"color,omitempty" yaml:"color,omitempty"`

	// Display description of the organization
	// Example: Organization description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// An array of email domains configured for an organization for the purposes of IDP discovery
	Domains []string `json:"domains" yaml:"domains"`

	// Unique identifier of an organization
	//
	// If not provided, a random ID is generated.
	// Example: default
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// issuer url
	IssuerURL string `json:"issuer_url,omitempty" yaml:"issuer_url,omitempty"`

	// metadata
	Metadata *ServerMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// Display name of the organization
	// Example: default
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// number of child organizations
	NumberOfChildOrganizations int64 `json:"number_of_child_organizations,omitempty" yaml:"number_of_child_organizations,omitempty"`

	// subject format
	// Enum: [hash legacy]
	SubjectFormat string `json:"subject_format,omitempty" yaml:"subject_format,omitempty"`

	// subject identifier algorithm salt
	SubjectIdentifierAlgorithmSalt string `json:"subject_identifier_algorithm_salt,omitempty" yaml:"subject_identifier_algorithm_salt,omitempty"`

	// If true this organization can be used as a template when creating a new ones.
	Template bool `json:"template,omitempty" yaml:"template,omitempty"`

	// theme id
	ThemeID string `json:"theme_id,omitempty" yaml:"theme_id,omitempty"`
}

OrganizationResponse organization response

swagger:model OrganizationResponse

func (*OrganizationResponse) ContextValidate ¶

func (m *OrganizationResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this organization response based on the context it is used

func (*OrganizationResponse) MarshalBinary ¶

func (m *OrganizationResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OrganizationResponse) UnmarshalBinary ¶

func (m *OrganizationResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OrganizationResponse) Validate ¶

func (m *OrganizationResponse) Validate(formats strfmt.Registry) error

Validate validates this organization response

type OrganizationsResponse ¶

type OrganizationsResponse struct {

	// organizations
	Organizations []*OrganizationResponse `json:"organizations" yaml:"organizations"`
}

OrganizationsResponse organizations response

swagger:model OrganizationsResponse

func (*OrganizationsResponse) ContextValidate ¶

func (m *OrganizationsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this organizations response based on the context it is used

func (*OrganizationsResponse) MarshalBinary ¶

func (m *OrganizationsResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*OrganizationsResponse) UnmarshalBinary ¶

func (m *OrganizationsResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*OrganizationsResponse) Validate ¶

func (m *OrganizationsResponse) Validate(formats strfmt.Registry) error

Validate validates this organizations response

type PDPDescriptor ¶

type PDPDescriptor struct {

	// assertion ID request services
	AssertionIDRequestServices []*Endpoint `json:"AssertionIDRequestServices" yaml:"AssertionIDRequestServices"`

	// authz services
	AuthzServices []*Endpoint `json:"AuthzServices" yaml:"AuthzServices"`

	// cache duration
	CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"`

	// contact people
	ContactPeople []*ContactPerson `json:"ContactPeople" yaml:"ContactPeople"`

	// error URL
	ErrorURL string `json:"ErrorURL,omitempty" yaml:"ErrorURL,omitempty"`

	// ID
	ID string `json:"ID,omitempty" yaml:"ID,omitempty"`

	// key descriptors
	KeyDescriptors []*KeyDescriptor `json:"KeyDescriptors" yaml:"KeyDescriptors"`

	// name ID formats
	NameIDFormats []NameIDFormat `json:"NameIDFormats" yaml:"NameIDFormats"`

	// organization
	Organization *Organization `json:"Organization,omitempty" yaml:"Organization,omitempty"`

	// protocol support enumeration
	ProtocolSupportEnumeration string `json:"ProtocolSupportEnumeration,omitempty" yaml:"ProtocolSupportEnumeration,omitempty"`

	// signature
	Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"`

	// valid until
	// Format: date-time
	ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"`
}

PDPDescriptor PDPDescriptor represents the SAML PDPDescriptor object.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.6

swagger:model PDPDescriptor

func (*PDPDescriptor) ContextValidate ¶

func (m *PDPDescriptor) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this p d p descriptor based on the context it is used

func (*PDPDescriptor) MarshalBinary ¶

func (m *PDPDescriptor) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PDPDescriptor) UnmarshalBinary ¶

func (m *PDPDescriptor) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PDPDescriptor) Validate ¶

func (m *PDPDescriptor) Validate(formats strfmt.Registry) error

Validate validates this p d p descriptor

type PIICategory ¶

type PIICategory struct {

	// name
	// Example: HIPAA
	Name string `json:"name,omitempty" yaml:"name,omitempty"`
}

PIICategory p i i category

swagger:model PIICategory

func (*PIICategory) ContextValidate ¶

func (m *PIICategory) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this p i i category based on context it is used

func (*PIICategory) MarshalBinary ¶

func (m *PIICategory) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PIICategory) UnmarshalBinary ¶

func (m *PIICategory) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PIICategory) Validate ¶

func (m *PIICategory) Validate(formats strfmt.Registry) error

Validate validates this p i i category

type PasswordPayload ¶

type PasswordPayload struct {

	// identifier
	Identifier string `json:"identifier,omitempty" yaml:"identifier,omitempty"`

	// operation type
	OperationType string `json:"operation_type,omitempty" yaml:"operation_type,omitempty"`

	// user ID
	UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"`
}

PasswordPayload PasswordPayload password payload

swagger:model PasswordPayload

func (*PasswordPayload) ContextValidate ¶

func (m *PasswordPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this password payload based on context it is used

func (*PasswordPayload) MarshalBinary ¶

func (m *PasswordPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PasswordPayload) UnmarshalBinary ¶

func (m *PasswordPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PasswordPayload) Validate ¶

func (m *PasswordPayload) Validate(formats strfmt.Registry) error

Validate validates this password payload

type PayloadSettings ¶

type PayloadSettings struct {

	// payload format
	// Enum: [json jws]
	Format string `json:"format,omitempty" yaml:"format,omitempty"`

	// jws payload
	JwsPayload *JWSPayloadSettings `json:"jws_payload,omitempty" yaml:"jws_payload,omitempty"`
}

PayloadSettings payload settings

swagger:model PayloadSettings

func (*PayloadSettings) ContextValidate ¶

func (m *PayloadSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this payload settings based on the context it is used

func (*PayloadSettings) MarshalBinary ¶

func (m *PayloadSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PayloadSettings) UnmarshalBinary ¶

func (m *PayloadSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PayloadSettings) Validate ¶

func (m *PayloadSettings) Validate(formats strfmt.Registry) error

Validate validates this payload settings

type PersonalDetails ¶

type PersonalDetails struct {

	// user id
	UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"`
}

PersonalDetails personal details

swagger:model PersonalDetails

func (*PersonalDetails) ContextValidate ¶

func (m *PersonalDetails) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this personal details based on context it is used

func (*PersonalDetails) MarshalBinary ¶

func (m *PersonalDetails) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PersonalDetails) UnmarshalBinary ¶

func (m *PersonalDetails) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PersonalDetails) Validate ¶

func (m *PersonalDetails) Validate(formats strfmt.Registry) error

Validate validates this personal details

type Policies ¶

type Policies struct {

	// list of policies
	Policies []*Policy `json:"policies" yaml:"policies"`
}

Policies policies

swagger:model Policies

func (*Policies) ContextValidate ¶

func (m *Policies) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this policies based on the context it is used

func (*Policies) MarshalBinary ¶

func (m *Policies) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Policies) UnmarshalBinary ¶

func (m *Policies) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Policies) Validate ¶

func (m *Policies) Validate(formats strfmt.Registry) error

Validate validates this policies

type Policy ¶

type Policy struct {

	// The definition of an Open Policy Agent (OPA) policy provided using the REGO language.
	Definition string `json:"definition,omitempty" yaml:"definition,omitempty"`

	// Unique ID of your policy
	// Example: 1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// Language of a policy
	//
	// ACP supports creating Cloudentity policies (using a visual editor or defined using JSON or
	// YAML) and policies defined using REGO (language used by Open Policy Agent (OPA)).
	// Example: cloudentity
	Language string `json:"language,omitempty" yaml:"language,omitempty"`

	// Display name for your policy
	// Example: check_consent
	PolicyName string `json:"policy_name,omitempty" yaml:"policy_name,omitempty"`

	// ID of your authorization server (workspace)
	// Example: default
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// ID of your tenant
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// Define a type of your policy
	//
	// ACP is provided with the following policy types: user, developer, machine, dcr, api.
	//
	// Depending on the policy type the policy can be assigned to different policy
	// execution points.
	//
	// A policy of the `user` type can be assigned only to the following scopes: `scope_user_grant`,
	// `server_user_token`, `client_user_token`.
	//
	// A `developer` policy can be assigned only to the `scope_client_assignment` and
	// `server_client_assignment` scopes.
	//
	// A policy of the `machine` type can be assigned only to the following scopes:
	// `scope_machine_grant`, `server_machine_token`, `client_machine_token`.
	//
	// A `dcr` policy can be assigned only to the `scope_dynamic_client_registration` and the
	// `server_dynamic_client_registration` scopes.
	//
	// An `api` policy can be assigned to all of the policy execution points.
	//
	// Each of the policies type has its defined and provided out of the box policy validators.
	// Example: user
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// An array of validators for a Cloudentity policy
	Validators []*ValidatorConfig `json:"validators" yaml:"validators"`
}

Policy policy

swagger:model Policy

func (*Policy) ContextValidate ¶

func (m *Policy) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this policy based on the context it is used

func (*Policy) MarshalBinary ¶

func (m *Policy) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Policy) UnmarshalBinary ¶

func (m *Policy) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Policy) Validate ¶

func (m *Policy) Validate(formats strfmt.Registry) error

Validate validates this policy

type PolicyEvaluatedPayload ¶

type PolicyEvaluatedPayload struct {

	// Policy output
	Output map[string]string `json:"output,omitempty" yaml:"output,omitempty"`

	// policy
	Policy *PolicyPayload `json:"policy,omitempty" yaml:"policy,omitempty"`

	// An array of recovery methods that take place when a policy validation fails.
	Recovery []interface{} `json:"recovery" yaml:"recovery"`

	// The result of policy validation.
	Result string `json:"result,omitempty" yaml:"result,omitempty"`
}

PolicyEvaluatedPayload policy evaluated payload

swagger:model PolicyEvaluatedPayload

func (*PolicyEvaluatedPayload) ContextValidate ¶

func (m *PolicyEvaluatedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this policy evaluated payload based on the context it is used

func (*PolicyEvaluatedPayload) MarshalBinary ¶

func (m *PolicyEvaluatedPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PolicyEvaluatedPayload) UnmarshalBinary ¶

func (m *PolicyEvaluatedPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PolicyEvaluatedPayload) Validate ¶

func (m *PolicyEvaluatedPayload) Validate(formats strfmt.Registry) error

Validate validates this policy evaluated payload

type PolicyExecutionPoint ¶

type PolicyExecutionPoint struct {

	// Optional policy ID
	// Example: 1
	PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"`

	// The ID of your authorization server (workspace)
	// Example: default
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// String representation of the target's ID
	// Example: 1
	TargetFk string `json:"target_fk,omitempty" yaml:"target_fk,omitempty"`

	// The ID of your tenant
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// String representation of the policy execution point type
	//
	// Policies can be assigned to different policy execution points. For example, you can create a
	// policy that you want to trigger while calls are made to your APIs. In this
	// case, the type of the policy execution point is `api`. While
	// choosing the policies that are applied for API calls, only those with the
	// `api` type are available.
	// Example: scope_client_assignment
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

PolicyExecutionPoint policy execution point

swagger:model PolicyExecutionPoint

func (*PolicyExecutionPoint) ContextValidate ¶

func (m *PolicyExecutionPoint) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this policy execution point based on context it is used

func (*PolicyExecutionPoint) MarshalBinary ¶

func (m *PolicyExecutionPoint) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PolicyExecutionPoint) UnmarshalBinary ¶

func (m *PolicyExecutionPoint) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PolicyExecutionPoint) Validate ¶

func (m *PolicyExecutionPoint) Validate(formats strfmt.Registry) error

Validate validates this policy execution point

type PolicyExecutionPoints ¶

type PolicyExecutionPoints struct {

	// list of policy executions
	ExecutionPoints []*PolicyExecutionPoint `json:"execution_points" yaml:"execution_points"`
}

PolicyExecutionPoints policy execution points

swagger:model PolicyExecutionPoints

func (*PolicyExecutionPoints) ContextValidate ¶

func (m *PolicyExecutionPoints) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this policy execution points based on the context it is used

func (*PolicyExecutionPoints) MarshalBinary ¶

func (m *PolicyExecutionPoints) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PolicyExecutionPoints) UnmarshalBinary ¶

func (m *PolicyExecutionPoints) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PolicyExecutionPoints) Validate ¶

func (m *PolicyExecutionPoints) Validate(formats strfmt.Registry) error

Validate validates this policy execution points

type PolicyPayload ¶

type PolicyPayload struct {

	// String representation of the policy execution point type
	ExecutionPointType string `json:"execution_point_type,omitempty" yaml:"execution_point_type,omitempty"`

	// Unique key, derived from execution point, of protected resource where the policy is assigned.
	//
	// Example key for policy in default tenant, default server protecting scope email for machine access.
	// default/default/scope/email/machine
	Key string `json:"key,omitempty" yaml:"key,omitempty"`

	// Define a type of your policy
	//
	// ACP is provided with the following policy types: user, developer, machine, dcr, api.
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

PolicyPayload policy payload

swagger:model PolicyPayload

func (*PolicyPayload) ContextValidate ¶

func (m *PolicyPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this policy payload based on context it is used

func (*PolicyPayload) MarshalBinary ¶

func (m *PolicyPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PolicyPayload) UnmarshalBinary ¶

func (m *PolicyPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PolicyPayload) Validate ¶

func (m *PolicyPayload) Validate(formats strfmt.Registry) error

Validate validates this policy payload

type PolicyValidationFailure ¶

type PolicyValidationFailure struct {

	// Details on the failed validation for a policy
	Details string `json:"details,omitempty" yaml:"details,omitempty"`

	// Message displayed for failed validation
	Message string `json:"message,omitempty" yaml:"message,omitempty"`

	// String representation of the validator for which the policy failed validation
	Validator string `json:"validator,omitempty" yaml:"validator,omitempty"`
}

PolicyValidationFailure Defines the failure that took place for a policy validation

swagger:model PolicyValidationFailure

func (*PolicyValidationFailure) ContextValidate ¶

func (m *PolicyValidationFailure) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this policy validation failure based on context it is used

func (*PolicyValidationFailure) MarshalBinary ¶

func (m *PolicyValidationFailure) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PolicyValidationFailure) UnmarshalBinary ¶

func (m *PolicyValidationFailure) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PolicyValidationFailure) Validate ¶

func (m *PolicyValidationFailure) Validate(formats strfmt.Registry) error

Validate validates this policy validation failure

type PolicyValidationRecovery ¶

type PolicyValidationRecovery struct {

	// id
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// type
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

PolicyValidationRecovery policy validation recovery

swagger:model PolicyValidationRecovery

func (*PolicyValidationRecovery) ContextValidate ¶

func (m *PolicyValidationRecovery) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this policy validation recovery based on context it is used

func (*PolicyValidationRecovery) MarshalBinary ¶

func (m *PolicyValidationRecovery) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PolicyValidationRecovery) UnmarshalBinary ¶

func (m *PolicyValidationRecovery) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PolicyValidationRecovery) Validate ¶

func (m *PolicyValidationRecovery) Validate(formats strfmt.Registry) error

Validate validates this policy validation recovery

type PolicyValidationResult ¶

type PolicyValidationResult struct {

	// An array of failures that took place during the policy validation process
	Failure []*PolicyValidationFailure `json:"failure" yaml:"failure"`

	// An array of recovery methods that take place when a policy validation fails
	Recovery []*PolicyValidationRecovery `json:"recovery" yaml:"recovery"`

	// String representation of the policy validation result
	Result string `json:"result,omitempty" yaml:"result,omitempty"`
}

PolicyValidationResult Provides information on the results of a policy validation

swagger:model PolicyValidationResult

func (*PolicyValidationResult) ContextValidate ¶

func (m *PolicyValidationResult) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this policy validation result based on the context it is used

func (*PolicyValidationResult) MarshalBinary ¶

func (m *PolicyValidationResult) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PolicyValidationResult) UnmarshalBinary ¶

func (m *PolicyValidationResult) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PolicyValidationResult) Validate ¶

func (m *PolicyValidationResult) Validate(formats strfmt.Registry) error

Validate validates this policy validation result

type PoolAuditPayload ¶

type PoolAuditPayload struct {

	// authentication mechanisms
	AuthenticationMechanisms AuthenticationMechanisms `json:"authentication_mechanisms,omitempty" yaml:"authentication_mechanisms,omitempty"`

	// description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// name
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// pool id
	PoolID string `json:"pool_id,omitempty" yaml:"pool_id,omitempty"`

	// public registration allowed
	PublicRegistrationAllowed bool `json:"public_registration_allowed,omitempty" yaml:"public_registration_allowed,omitempty"`
}

PoolAuditPayload pool audit payload

swagger:model PoolAuditPayload

func (*PoolAuditPayload) ContextValidate ¶

func (m *PoolAuditPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this pool audit payload based on the context it is used

func (*PoolAuditPayload) MarshalBinary ¶

func (m *PoolAuditPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PoolAuditPayload) UnmarshalBinary ¶

func (m *PoolAuditPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PoolAuditPayload) Validate ¶

func (m *PoolAuditPayload) Validate(formats strfmt.Registry) error

Validate validates this pool audit payload

type PrivacyLedgerEvent ¶

type PrivacyLedgerEvent struct {

	// date
	// Format: date-time
	Date strfmt.DateTime `json:"date,omitempty" yaml:"date,omitempty"`

	// id
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// payload
	Payload *PrivacyLedgerPayload `json:"payload,omitempty" yaml:"payload,omitempty"`

	// payload signature
	PayloadSignature string `json:"payload_signature,omitempty" yaml:"payload_signature,omitempty"`

	// subject
	Subject string `json:"subject,omitempty" yaml:"subject,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`
}

PrivacyLedgerEvent privacy ledger event

swagger:model PrivacyLedgerEvent

func (*PrivacyLedgerEvent) ContextValidate ¶

func (m *PrivacyLedgerEvent) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this privacy ledger event based on the context it is used

func (*PrivacyLedgerEvent) MarshalBinary ¶

func (m *PrivacyLedgerEvent) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PrivacyLedgerEvent) UnmarshalBinary ¶

func (m *PrivacyLedgerEvent) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PrivacyLedgerEvent) Validate ¶

func (m *PrivacyLedgerEvent) Validate(formats strfmt.Registry) error

Validate validates this privacy ledger event

type PrivacyLedgerEventType ¶

type PrivacyLedgerEventType string

PrivacyLedgerEventType privacy ledger event type

swagger:model PrivacyLedgerEventType

func (PrivacyLedgerEventType) ContextValidate ¶

func (m PrivacyLedgerEventType) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this privacy ledger event type based on context it is used

func (PrivacyLedgerEventType) Validate ¶

func (m PrivacyLedgerEventType) Validate(formats strfmt.Registry) error

Validate validates this privacy ledger event type

type PrivacyLedgerEvents ¶

type PrivacyLedgerEvents struct {

	// events
	Events []*PrivacyLedgerEvent `json:"events" yaml:"events"`
}

PrivacyLedgerEvents privacy ledger events

swagger:model PrivacyLedgerEvents

func (*PrivacyLedgerEvents) ContextValidate ¶

func (m *PrivacyLedgerEvents) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this privacy ledger events based on the context it is used

func (*PrivacyLedgerEvents) MarshalBinary ¶

func (m *PrivacyLedgerEvents) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PrivacyLedgerEvents) UnmarshalBinary ¶

func (m *PrivacyLedgerEvents) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PrivacyLedgerEvents) Validate ¶

func (m *PrivacyLedgerEvents) Validate(formats strfmt.Registry) error

Validate validates this privacy ledger events

type PrivacyLedgerPayload ¶

type PrivacyLedgerPayload struct {

	// consent granted
	ConsentGranted *ConsentGrantedEvent `json:"consent_granted,omitempty" yaml:"consent_granted,omitempty"`

	// consent revoked
	ConsentRevoked *ConsentRevokedEvent `json:"consent_revoked,omitempty" yaml:"consent_revoked,omitempty"`

	// event type
	EventType PrivacyLedgerEventType `json:"event_type,omitempty" yaml:"event_type,omitempty"`
}

PrivacyLedgerPayload privacy ledger payload

swagger:model PrivacyLedgerPayload

func (*PrivacyLedgerPayload) ContextValidate ¶

func (m *PrivacyLedgerPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this privacy ledger payload based on the context it is used

func (*PrivacyLedgerPayload) MarshalBinary ¶

func (m *PrivacyLedgerPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PrivacyLedgerPayload) UnmarshalBinary ¶

func (m *PrivacyLedgerPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PrivacyLedgerPayload) Validate ¶

func (m *PrivacyLedgerPayload) Validate(formats strfmt.Registry) error

Validate validates this privacy ledger payload

type PrivateKeyJWTCredentials ¶

type PrivateKeyJWTCredentials struct {

	// Algorithm used to sign the client_assertion (see JWS) - default RS256
	Algorithm string `json:"algorithm,omitempty" yaml:"algorithm,omitempty"`

	// ExpiresIn defines how long client_assertion is valid for - default 30 seconds
	// Format: duration
	Exp strfmt.Duration `json:"exp,omitempty" yaml:"exp,omitempty"`

	// Key is a PEM formatted private key used to sign client_assertion
	Key string `json:"key,omitempty" yaml:"key,omitempty"`
}

PrivateKeyJWTCredentials PrivateKeyJWT authentication settings

swagger:model PrivateKeyJWTCredentials

func (*PrivateKeyJWTCredentials) ContextValidate ¶

func (m *PrivateKeyJWTCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this private key j w t credentials based on context it is used

func (*PrivateKeyJWTCredentials) MarshalBinary ¶

func (m *PrivateKeyJWTCredentials) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*PrivateKeyJWTCredentials) UnmarshalBinary ¶

func (m *PrivateKeyJWTCredentials) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*PrivateKeyJWTCredentials) Validate ¶

func (m *PrivateKeyJWTCredentials) Validate(formats strfmt.Registry) error

Validate validates this private key j w t credentials

type ProtectedType ¶

type ProtectedType string

ProtectedType protected type

swagger:model ProtectedType

func (ProtectedType) ContextValidate ¶

func (m ProtectedType) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this protected type based on context it is used

func (ProtectedType) Validate ¶

func (m ProtectedType) Validate(formats strfmt.Registry) error

Validate validates this protected type

type ProvisioningMode ¶

type ProvisioningMode string

ProvisioningMode provisioning mode

swagger:model ProvisioningMode

func (ProvisioningMode) ContextValidate ¶

func (m ProvisioningMode) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this provisioning mode based on context it is used

func (ProvisioningMode) Validate ¶

func (m ProvisioningMode) Validate(formats strfmt.Registry) error

Validate validates this provisioning mode

type Purpose ¶

type Purpose struct {

	// name
	// Example: Core Function
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// is the purpose primary. If there are multiple purposes defined, one of them must be marked as primary.
	// Example: true
	Primary bool `json:"primary,omitempty" yaml:"primary,omitempty"`
}

Purpose purpose

swagger:model Purpose

func (*Purpose) ContextValidate ¶

func (m *Purpose) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this purpose based on context it is used

func (*Purpose) MarshalBinary ¶

func (m *Purpose) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Purpose) UnmarshalBinary ¶

func (m *Purpose) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Purpose) Validate ¶

func (m *Purpose) Validate(formats strfmt.Registry) error

Validate validates this purpose

type RecentActivities ¶

type RecentActivities struct {

	// activities
	Activities []*RecentActivity `json:"activities" yaml:"activities"`
}

RecentActivities recent activities

swagger:model RecentActivities

func (*RecentActivities) ContextValidate ¶

func (m *RecentActivities) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this recent activities based on the context it is used

func (*RecentActivities) MarshalBinary ¶

func (m *RecentActivities) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RecentActivities) UnmarshalBinary ¶

func (m *RecentActivities) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RecentActivities) Validate ¶

func (m *RecentActivities) Validate(formats strfmt.Registry) error

Validate validates this recent activities

type RecentActivity ¶

type RecentActivity struct {

	// date
	// Format: date-time
	Date strfmt.DateTime `json:"date,omitempty" yaml:"date,omitempty"`

	// id
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// payload
	Payload *RecentActivityPayload `json:"payload,omitempty" yaml:"payload,omitempty"`

	// server id
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`
}

RecentActivity recent activity

swagger:model RecentActivity

func (*RecentActivity) ContextValidate ¶

func (m *RecentActivity) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this recent activity based on the context it is used

func (*RecentActivity) MarshalBinary ¶

func (m *RecentActivity) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RecentActivity) UnmarshalBinary ¶

func (m *RecentActivity) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RecentActivity) Validate ¶

func (m *RecentActivity) Validate(formats strfmt.Registry) error

Validate validates this recent activity

type RecentActivityPayload ¶

type RecentActivityPayload struct {

	// action
	Action string `json:"action,omitempty" yaml:"action,omitempty"`

	// count
	Count int64 `json:"count,omitempty" yaml:"count,omitempty"`

	// primary name
	PrimaryName string `json:"primary_name,omitempty" yaml:"primary_name,omitempty"`

	// secondary name
	SecondaryName string `json:"secondary_name,omitempty" yaml:"secondary_name,omitempty"`

	// subject
	Subject string `json:"subject,omitempty" yaml:"subject,omitempty"`

	// subject id
	SubjectID string `json:"subject_id,omitempty" yaml:"subject_id,omitempty"`
}

RecentActivityPayload recent activity payload

swagger:model RecentActivityPayload

func (*RecentActivityPayload) ContextValidate ¶

func (m *RecentActivityPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this recent activity payload based on context it is used

func (*RecentActivityPayload) MarshalBinary ¶

func (m *RecentActivityPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RecentActivityPayload) UnmarshalBinary ¶

func (m *RecentActivityPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RecentActivityPayload) Validate ¶

func (m *RecentActivityPayload) Validate(formats strfmt.Registry) error

Validate validates this recent activity payload

type RecoveryConfig ¶

type RecoveryConfig struct {

	// type
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

RecoveryConfig recovery config

swagger:model RecoveryConfig

func (*RecoveryConfig) ContextValidate ¶

func (m *RecoveryConfig) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this recovery config based on context it is used

func (*RecoveryConfig) MarshalBinary ¶

func (m *RecoveryConfig) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RecoveryConfig) UnmarshalBinary ¶

func (m *RecoveryConfig) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RecoveryConfig) Validate ¶

func (m *RecoveryConfig) Validate(formats strfmt.Registry) error

Validate validates this recovery config

type RedirectURIs ¶

type RedirectURIs []string

RedirectURIs OAuth-allowed redirect URIs

Cloudentity uses redirect URIs to redirect users back to the application after they authorized the application. Along with the redirection, an authorization code or access token is added to the URL.

For backward compatibility reasons, it's also acceptable to pass `redirect_uris` as a string, for example: https://example.com/callback.

example: ["https://example.com/callback"]

swagger:model RedirectURIs

func (RedirectURIs) ContextValidate ¶

func (m RedirectURIs) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this redirect u r is based on context it is used

func (RedirectURIs) Validate ¶

func (m RedirectURIs) Validate(formats strfmt.Registry) error

Validate validates this redirect u r is

type RegistrationToken ¶

type RegistrationToken struct {

	// client uri
	ClientURI string `json:"client_uri,omitempty" yaml:"client_uri,omitempty"`

	// expires in
	ExpiresIn int64 `json:"expires_in,omitempty" yaml:"expires_in,omitempty"`

	// signature
	Signature string `json:"signature,omitempty" yaml:"signature,omitempty"`
}

RegistrationToken registration token

swagger:model RegistrationToken

func (*RegistrationToken) ContextValidate ¶

func (m *RegistrationToken) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this registration token based on context it is used

func (*RegistrationToken) MarshalBinary ¶

func (m *RegistrationToken) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RegistrationToken) UnmarshalBinary ¶

func (m *RegistrationToken) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RegistrationToken) Validate ¶

func (m *RegistrationToken) Validate(formats strfmt.Registry) error

Validate validates this registration token

type RegistryReference ¶

type RegistryReference struct {

	// An identifier of the intermediary that can be looked up from a legal identity registry source.
	RegisteredEntityID string `json:"registered_entity_id,omitempty" yaml:"registered_entity_id,omitempty"`

	// The legal company name for the intermediary.
	RegisteredEntityName string `json:"registered_entity_name,omitempty" yaml:"registered_entity_name,omitempty"`

	// registry
	Registry string `json:"registry,omitempty" yaml:"registry,omitempty"`
}

RegistryReference Used for registry references. In snake case to match IETF RFC 7591 naming formats

swagger:model RegistryReference

func (*RegistryReference) ContextValidate ¶

func (m *RegistryReference) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this registry reference based on context it is used

func (*RegistryReference) MarshalBinary ¶

func (m *RegistryReference) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RegistryReference) UnmarshalBinary ¶

func (m *RegistryReference) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RegistryReference) Validate ¶

func (m *RegistryReference) Validate(formats strfmt.Registry) error

Validate validates this registry reference

type RemoveServiceConfigurationResult ¶

type RemoveServiceConfigurationResult struct {

	// not removed policies
	NotRemovedPolicies []*Policy `json:"not_removed_policies" yaml:"not_removed_policies"`

	// removed apis
	RemovedApis []*API `json:"removed_apis" yaml:"removed_apis"`

	// removed policies
	RemovedPolicies []*Policy `json:"removed_policies" yaml:"removed_policies"`
}

RemoveServiceConfigurationResult remove service configuration result

swagger:model RemoveServiceConfigurationResult

func (*RemoveServiceConfigurationResult) ContextValidate ¶

func (m *RemoveServiceConfigurationResult) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this remove service configuration result based on the context it is used

func (*RemoveServiceConfigurationResult) MarshalBinary ¶

func (m *RemoveServiceConfigurationResult) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RemoveServiceConfigurationResult) UnmarshalBinary ¶

func (m *RemoveServiceConfigurationResult) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RemoveServiceConfigurationResult) Validate ¶

Validate validates this remove service configuration result

type RequestValidatedPayload ¶

type RequestValidatedPayload struct {

	// Actor claims
	ActorClaims map[string]interface{} `json:"actor_claims,omitempty" yaml:"actor_claims,omitempty"`

	// anonymous
	Anonymous bool `json:"anonymous,omitempty" yaml:"anonymous,omitempty"`

	// api
	API *API `json:"api,omitempty" yaml:"api,omitempty"`

	// claims
	Claims JwtClaims `json:"claims,omitempty" yaml:"claims,omitempty"`

	// OAuth client application identifier.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// Human readable name of a client application
	ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"`

	// Stores information if the owner of the client application is a developer.
	CreatedByDeveloper bool `json:"created_by_developer,omitempty" yaml:"created_by_developer,omitempty"`

	// duration ms
	DurationMs int64 `json:"duration_ms,omitempty" yaml:"duration_ms,omitempty"`

	// gateway
	Gateway *Gateway `json:"gateway,omitempty" yaml:"gateway,omitempty"`

	// Stores the information which grant type was selected to perfom a given action.
	// Matches one of allowed OAuth client grant types for a given client.
	GrantType string `json:"grant_type,omitempty" yaml:"grant_type,omitempty"`

	// ID of the Identity Pool
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// invalid token
	InvalidToken bool `json:"invalid_token,omitempty" yaml:"invalid_token,omitempty"`

	// May act claims
	MayActClaims map[string]interface{} `json:"may_act_claims,omitempty" yaml:"may_act_claims,omitempty"`

	// output
	Output map[string]string `json:"output,omitempty" yaml:"output,omitempty"`

	// Stores information if the client application is a public one.
	Public bool `json:"public,omitempty" yaml:"public,omitempty"`

	// Requester IP address obtained from system network socket information.
	RemoteAddr string `json:"remote_addr,omitempty" yaml:"remote_addr,omitempty"`

	// result
	Result *PolicyValidationResult `json:"result,omitempty" yaml:"result,omitempty"`

	// ID of the authorization server (workspace) to which an access request is tied.
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// service
	Service *Service `json:"service,omitempty" yaml:"service,omitempty"`

	// Session id of a given subject. It's uniform across the authentication processes.
	// It can be used as a correlation ID between a different audit events.
	SessionID string `json:"session_id,omitempty" yaml:"session_id,omitempty"`

	// Identification of the principal that is the subject of authorization.
	// For the authorization grant, the subject typically identifies an authorized accessor for which the access token is being requested.
	// For client authentication, the subject is the client_id of the OAuth client.
	Subject string `json:"subject,omitempty" yaml:"subject,omitempty"`

	// Stores information if the client application is a system tenant's application.
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// Token endpoint authentication method configured for a client application.
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	TokenEndpointAuthnMethod string `json:"token_endpoint_authn_method,omitempty" yaml:"token_endpoint_authn_method,omitempty"`

	// Token signature
	TokenSignature string `json:"token_signature,omitempty" yaml:"token_signature,omitempty"`

	// Requester IP address obtained from True-Client-IP header.
	TrueClientIP string `json:"true_client_ip,omitempty" yaml:"true_client_ip,omitempty"`

	// A characteristic string that lets servers and network peers identify the application, operating system, vendor, and/or version of the requesting user agent.
	UserAgent string `json:"user_agent,omitempty" yaml:"user_agent,omitempty"`

	// ID of the authorization server (workspace) to which a resource is tied.
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`

	// Requester IP address obtained from X-Forwarded-For header.
	XForwardedFor string `json:"x_forwarded_for,omitempty" yaml:"x_forwarded_for,omitempty"`

	// Requester IP address obtained from X-Real-IP header.
	XRealIP string `json:"x_real_ip,omitempty" yaml:"x_real_ip,omitempty"`
}

RequestValidatedPayload request validated payload

swagger:model RequestValidatedPayload

func (*RequestValidatedPayload) ContextValidate ¶

func (m *RequestValidatedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this request validated payload based on the context it is used

func (*RequestValidatedPayload) MarshalBinary ¶

func (m *RequestValidatedPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RequestValidatedPayload) UnmarshalBinary ¶

func (m *RequestValidatedPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RequestValidatedPayload) Validate ¶

func (m *RequestValidatedPayload) Validate(formats strfmt.Registry) error

Validate validates this request validated payload

type RequestedAttribute ¶

type RequestedAttribute struct {

	// friendly name
	FriendlyName string `json:"FriendlyName,omitempty" yaml:"FriendlyName,omitempty"`

	// is required
	IsRequired bool `json:"IsRequired,omitempty" yaml:"IsRequired,omitempty"`

	// name
	Name string `json:"Name,omitempty" yaml:"Name,omitempty"`

	// name format
	NameFormat string `json:"NameFormat,omitempty" yaml:"NameFormat,omitempty"`

	// values
	Values []*AttributeValue `json:"Values" yaml:"Values"`
}

RequestedAttribute RequestedAttribute represents the SAML RequestedAttribute object.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.4.2

swagger:model RequestedAttribute

func (*RequestedAttribute) ContextValidate ¶

func (m *RequestedAttribute) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this requested attribute based on the context it is used

func (*RequestedAttribute) MarshalBinary ¶

func (m *RequestedAttribute) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RequestedAttribute) UnmarshalBinary ¶

func (m *RequestedAttribute) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RequestedAttribute) Validate ¶

func (m *RequestedAttribute) Validate(formats strfmt.Registry) error

Validate validates this requested attribute

type ResponseModes ¶

type ResponseModes []string

ResponseModes response modes

swagger:model ResponseModes

func (ResponseModes) ContextValidate ¶

func (m ResponseModes) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this response modes based on context it is used

func (ResponseModes) Validate ¶

func (m ResponseModes) Validate(formats strfmt.Registry) error

Validate validates this response modes

type ResponseTypes ¶

type ResponseTypes []string

ResponseTypes An array of allowed response types

The array may consist of the following arguments:

`code` - when supplied as the value for the `response_type` parameter, a successful response includes an authorization code

`code token` - when supplied as the value for the `response_type` parameter, a successful response includes an access token, an access token type, and an authorization code

`id_token token` - when supplied as the value for the `response_type` parameter, a successful response includes an access token, an access token type, and an ID token

`code id_token token` - when supplied as the value for the `response_type` parameter, a successful response includes an authorization code, an ID token, an access token, and an access token type.

`token` - when supplied as the value for the `response_type` parameter, a successful response includes an access token and its type. This argument is used for the implicit grant flow, but is not recommended. Instead, you should use either the authorization code grant flow with PKCE or client authentication set to `none` and with the use of PKCE.

example: ["token", "id_token", "code"] default: ["code"]

swagger:model ResponseTypes

func (ResponseTypes) ContextValidate ¶

func (m ResponseTypes) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this response types based on context it is used

func (ResponseTypes) Validate ¶

func (m ResponseTypes) Validate(formats strfmt.Registry) error

Validate validates this response types

type RevocationChannel ¶

type RevocationChannel string

RevocationChannel revocation channel

swagger:model RevocationChannel

func (RevocationChannel) ContextValidate ¶

func (m RevocationChannel) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this revocation channel based on context it is used

func (RevocationChannel) Validate ¶

func (m RevocationChannel) Validate(formats strfmt.Registry) error

Validate validates this revocation channel

type RevocationReason ¶

type RevocationReason string

RevocationReason revocation reason

swagger:model RevocationReason

func (RevocationReason) ContextValidate ¶

func (m RevocationReason) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this revocation reason based on context it is used

func (RevocationReason) Validate ¶

func (m RevocationReason) Validate(formats strfmt.Registry) error

Validate validates this revocation reason

type RevokeIdentityPoolRoleRequest ¶

type RevokeIdentityPoolRoleRequest struct {

	// identity pool user pool id
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// identity pool user id
	IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"`

	// idp user idp id
	IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"`

	// role
	// Example: user_manager
	// Enum: [user_manager]
	Role string `json:"role,omitempty" yaml:"role,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	// Enum: [identity_pool_user idp]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// idp user workspace id
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

RevokeIdentityPoolRoleRequest revoke identity pool role request

swagger:model RevokeIdentityPoolRoleRequest

func (*RevokeIdentityPoolRoleRequest) ContextValidate ¶

func (m *RevokeIdentityPoolRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this revoke identity pool role request based on context it is used

func (*RevokeIdentityPoolRoleRequest) MarshalBinary ¶

func (m *RevokeIdentityPoolRoleRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RevokeIdentityPoolRoleRequest) UnmarshalBinary ¶

func (m *RevokeIdentityPoolRoleRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RevokeIdentityPoolRoleRequest) Validate ¶

func (m *RevokeIdentityPoolRoleRequest) Validate(formats strfmt.Registry) error

Validate validates this revoke identity pool role request

type RevokeTenantRoleRequest ¶

type RevokeTenantRoleRequest struct {

	// identity pool user pool id
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// identity pool user id
	IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"`

	// idp user idp id
	IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"`

	// role
	// Example: admin
	// Enum: [admin business_admin auditor member]
	Role string `json:"role,omitempty" yaml:"role,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	// Enum: [identity_pool_user idp]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// idp user workspace id
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

RevokeTenantRoleRequest revoke tenant role request

swagger:model RevokeTenantRoleRequest

func (*RevokeTenantRoleRequest) ContextValidate ¶

func (m *RevokeTenantRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this revoke tenant role request based on context it is used

func (*RevokeTenantRoleRequest) MarshalBinary ¶

func (m *RevokeTenantRoleRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RevokeTenantRoleRequest) UnmarshalBinary ¶

func (m *RevokeTenantRoleRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RevokeTenantRoleRequest) Validate ¶

func (m *RevokeTenantRoleRequest) Validate(formats strfmt.Registry) error

Validate validates this revoke tenant role request

type RevokeWorkspaceRoleRequest ¶

type RevokeWorkspaceRoleRequest struct {

	// identity pool user pool id
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// identity pool user id
	IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"`

	// idp user idp id
	IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"`

	// role
	// Example: admin
	// Enum: [admin auditor manager user_manager member]
	Role string `json:"role,omitempty" yaml:"role,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	// Enum: [identity_pool_user idp]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// idp user workspace id
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

RevokeWorkspaceRoleRequest revoke workspace role request

swagger:model RevokeWorkspaceRoleRequest

func (*RevokeWorkspaceRoleRequest) ContextValidate ¶

func (m *RevokeWorkspaceRoleRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this revoke workspace role request based on context it is used

func (*RevokeWorkspaceRoleRequest) MarshalBinary ¶

func (m *RevokeWorkspaceRoleRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RevokeWorkspaceRoleRequest) UnmarshalBinary ¶

func (m *RevokeWorkspaceRoleRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RevokeWorkspaceRoleRequest) Validate ¶

func (m *RevokeWorkspaceRoleRequest) Validate(formats strfmt.Registry) error

Validate validates this revoke workspace role request

type Rfc6902PatchOperation ¶

type Rfc6902PatchOperation struct {

	// Each operation must have at least one `op` member, which value indicates
	// the actual operation to be performed against the target (current) configuration.
	// For a detailed description of available operations,
	// see the [Operations #4 section of the RFC6902 specification](https://datatracker.ietf.org/doc/html/rfc6902#section-4).
	// Enum: [add remove replace move copy test]
	Op string `json:"op,omitempty" yaml:"op,omitempty"`

	// String containing a JSON-Pointer value ([RFC6901](https://datatracker.ietf.org/doc/html/rfc6901))
	// that references a location within the target configuration where the operation is performed.
	//
	// For available paths, reference the exported configuration.
	Path string `json:"path,omitempty" yaml:"path,omitempty"`

	// New object value applied to the patched (target) configuration.
	Value interface{} `json:"value,omitempty" yaml:"value,omitempty"`
}

Rfc6902PatchOperation rfc6902 patch operation

swagger:model Rfc6902PatchOperation

func (*Rfc6902PatchOperation) ContextValidate ¶

func (m *Rfc6902PatchOperation) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this rfc6902 patch operation based on context it is used

func (*Rfc6902PatchOperation) MarshalBinary ¶

func (m *Rfc6902PatchOperation) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Rfc6902PatchOperation) UnmarshalBinary ¶

func (m *Rfc6902PatchOperation) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Rfc6902PatchOperation) Validate ¶

func (m *Rfc6902PatchOperation) Validate(formats strfmt.Registry) error

Validate validates this rfc6902 patch operation

type Rfc6902PatchOperations ¶

type Rfc6902PatchOperations []*Rfc6902PatchOperation

Rfc6902PatchOperations rfc6902 patch operations

swagger:model Rfc6902PatchOperations

func (Rfc6902PatchOperations) ContextValidate ¶

func (m Rfc6902PatchOperations) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this rfc6902 patch operations based on the context it is used

func (Rfc6902PatchOperations) Validate ¶

func (m Rfc6902PatchOperations) Validate(formats strfmt.Registry) error

Validate validates this rfc6902 patch operations

type RoleDescriptor ¶

type RoleDescriptor struct {

	// cache duration
	CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"`

	// contact people
	ContactPeople []*ContactPerson `json:"ContactPeople" yaml:"ContactPeople"`

	// error URL
	ErrorURL string `json:"ErrorURL,omitempty" yaml:"ErrorURL,omitempty"`

	// ID
	ID string `json:"ID,omitempty" yaml:"ID,omitempty"`

	// key descriptors
	KeyDescriptors []*KeyDescriptor `json:"KeyDescriptors" yaml:"KeyDescriptors"`

	// organization
	Organization *Organization `json:"Organization,omitempty" yaml:"Organization,omitempty"`

	// protocol support enumeration
	ProtocolSupportEnumeration string `json:"ProtocolSupportEnumeration,omitempty" yaml:"ProtocolSupportEnumeration,omitempty"`

	// signature
	Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"`

	// valid until
	// Format: date-time
	ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"`
}

RoleDescriptor RoleDescriptor represents the SAML element RoleDescriptor.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.1

swagger:model RoleDescriptor

func (*RoleDescriptor) ContextValidate ¶

func (m *RoleDescriptor) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this role descriptor based on the context it is used

func (*RoleDescriptor) MarshalBinary ¶

func (m *RoleDescriptor) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RoleDescriptor) UnmarshalBinary ¶

func (m *RoleDescriptor) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RoleDescriptor) Validate ¶

func (m *RoleDescriptor) Validate(formats strfmt.Registry) error

Validate validates this role descriptor

type RoleGrantAuditPayload ¶

type RoleGrantAuditPayload struct {

	// resource
	Resource *RoleResource `json:"resource,omitempty" yaml:"resource,omitempty"`

	// role
	// Enum: [admin business_admin auditor manager user_manager member]
	Role string `json:"role,omitempty" yaml:"role,omitempty"`

	// subject
	Subject *RoleSubject `json:"subject,omitempty" yaml:"subject,omitempty"`
}

RoleGrantAuditPayload role grant audit payload

swagger:model RoleGrantAuditPayload

func (*RoleGrantAuditPayload) ContextValidate ¶

func (m *RoleGrantAuditPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this role grant audit payload based on the context it is used

func (*RoleGrantAuditPayload) MarshalBinary ¶

func (m *RoleGrantAuditPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RoleGrantAuditPayload) UnmarshalBinary ¶

func (m *RoleGrantAuditPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RoleGrantAuditPayload) Validate ¶

func (m *RoleGrantAuditPayload) Validate(formats strfmt.Registry) error

Validate validates this role grant audit payload

type RoleResource ¶

type RoleResource struct {

	// identity pool id
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// role
	// Enum: [admin business_admin auditor manager user_manager member]
	Role string `json:"role,omitempty" yaml:"role,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	// Enum: [tenant workspace identity_pool]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// workspace id
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

RoleResource role resource

swagger:model RoleResource

func (*RoleResource) ContextValidate ¶

func (m *RoleResource) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this role resource based on context it is used

func (*RoleResource) MarshalBinary ¶

func (m *RoleResource) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RoleResource) UnmarshalBinary ¶

func (m *RoleResource) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RoleResource) Validate ¶

func (m *RoleResource) Validate(formats strfmt.Registry) error

Validate validates this role resource

type RoleResources ¶

type RoleResources struct {

	// resources
	Resources []*RoleResource `json:"resources" yaml:"resources"`
}

RoleResources role resources

swagger:model RoleResources

func (*RoleResources) ContextValidate ¶

func (m *RoleResources) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this role resources based on the context it is used

func (*RoleResources) MarshalBinary ¶

func (m *RoleResources) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RoleResources) UnmarshalBinary ¶

func (m *RoleResources) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RoleResources) Validate ¶

func (m *RoleResources) Validate(formats strfmt.Registry) error

Validate validates this role resources

type RoleSubject ¶

type RoleSubject struct {

	// identity pool user pool id
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// identity pool user id
	IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"`

	// idp user idp id
	IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	// Enum: [identity_pool_user idp]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// idp user workspace id
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

RoleSubject role subject

swagger:model RoleSubject

func (*RoleSubject) ContextValidate ¶

func (m *RoleSubject) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this role subject based on context it is used

func (*RoleSubject) MarshalBinary ¶

func (m *RoleSubject) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RoleSubject) UnmarshalBinary ¶

func (m *RoleSubject) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RoleSubject) Validate ¶

func (m *RoleSubject) Validate(formats strfmt.Registry) error

Validate validates this role subject

type RotateClientSecretResponse ¶

type RotateClientSecretResponse struct {

	// secret
	Secret string `json:"secret,omitempty" yaml:"secret,omitempty"`
}

RotateClientSecretResponse rotate client secret response

swagger:model RotateClientSecretResponse

func (*RotateClientSecretResponse) ContextValidate ¶

func (m *RotateClientSecretResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this rotate client secret response based on context it is used

func (*RotateClientSecretResponse) MarshalBinary ¶

func (m *RotateClientSecretResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*RotateClientSecretResponse) UnmarshalBinary ¶

func (m *RotateClientSecretResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*RotateClientSecretResponse) Validate ¶

func (m *RotateClientSecretResponse) Validate(formats strfmt.Registry) error

Validate validates this rotate client secret response

type SAMLClientMetadataResponse ¶

type SAMLClientMetadataResponse struct {

	// in:body
	RawXML string `json:"raw_xml,omitempty" yaml:"raw_xml,omitempty"`
}

SAMLClientMetadataResponse s a m l client metadata response

swagger:model SAMLClientMetadataResponse

func (*SAMLClientMetadataResponse) ContextValidate ¶

func (m *SAMLClientMetadataResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this s a m l client metadata response based on context it is used

func (*SAMLClientMetadataResponse) MarshalBinary ¶

func (m *SAMLClientMetadataResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*SAMLClientMetadataResponse) UnmarshalBinary ¶

func (m *SAMLClientMetadataResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*SAMLClientMetadataResponse) Validate ¶

func (m *SAMLClientMetadataResponse) Validate(formats strfmt.Registry) error

Validate validates this s a m l client metadata response

type SAMLConfiguration ¶

type SAMLConfiguration struct {

	// Allows to change default subject name id.
	// The default one will be 'uid', even if the value is empty.
	SubjectNameID string `json:"subject_name_id,omitempty" yaml:"subject_name_id,omitempty"`
}

SAMLConfiguration s a m l configuration

swagger:model SAMLConfiguration

func (*SAMLConfiguration) ContextValidate ¶

func (m *SAMLConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this s a m l configuration based on context it is used

func (*SAMLConfiguration) MarshalBinary ¶

func (m *SAMLConfiguration) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*SAMLConfiguration) UnmarshalBinary ¶

func (m *SAMLConfiguration) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*SAMLConfiguration) Validate ¶

func (m *SAMLConfiguration) Validate(formats strfmt.Registry) error

Validate validates this s a m l configuration

type SAMLCredentials ¶

type SAMLCredentials struct {

	// The certificate of your IDP
	//
	// The certificate must start with `-----BEGIN CERTIFICATE-----` and end with `-----END CERTIFICATE-----`.
	IdpCertificate string `json:"idp_certificate,omitempty" yaml:"idp_certificate,omitempty"`
}

SAMLCredentials SAML IDP specific credentials

swagger:model SAMLCredentials

func (*SAMLCredentials) ContextValidate ¶

func (m *SAMLCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this s a m l credentials based on context it is used

func (*SAMLCredentials) MarshalBinary ¶

func (m *SAMLCredentials) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*SAMLCredentials) UnmarshalBinary ¶

func (m *SAMLCredentials) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*SAMLCredentials) Validate ¶

func (m *SAMLCredentials) Validate(formats strfmt.Registry) error

Validate validates this s a m l credentials

type SAMLIDP ¶

type SAMLIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// credentials
	Credentials *SAMLCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// settings
	Settings *SAMLSettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

SAMLIDP s a m l ID p

swagger:model SAMLIDP

func (*SAMLIDP) ContextValidate ¶

func (m *SAMLIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this s a m l ID p based on the context it is used

func (*SAMLIDP) MarshalBinary ¶

func (m *SAMLIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*SAMLIDP) UnmarshalBinary ¶

func (m *SAMLIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*SAMLIDP) Validate ¶

func (m *SAMLIDP) Validate(formats strfmt.Registry) error

Validate validates this s a m l ID p

type SAMLSettings ¶

type SAMLSettings struct {

	// Unique id of a service provider
	// Example: https://localhost:8443/default/default/login
	EntityIssuer string `json:"entity_issuer,omitempty" yaml:"entity_issuer,omitempty"`

	// The attribute name from the `AttributeStatement` SAML response which is used as an identifier in ACP
	//
	// Applies only when `identifierSource` parameter is set to `attribute`.
	IdentifierAttribute string `json:"identifier_attribute,omitempty" yaml:"identifier_attribute,omitempty"`

	// The source for an identifier
	//
	// The `identifierSource` parameter can have either the `subject` or the `attribute` value.
	//
	// It is used to provide an unique user attribute that is used as an identifier in ACP.
	//
	// Depending on which identifier source you choose, you must define either the
	// `identifierAttribute` or the `subjectNameIDFormat` parameter.
	IdentifierSource string `json:"identifier_source,omitempty" yaml:"identifier_source,omitempty"`

	// IDP metadata URL
	MetadataURL string `json:"metadata_url,omitempty" yaml:"metadata_url,omitempty"`

	// IDP metadata xml
	MetadataXML string `json:"metadata_xml,omitempty" yaml:"metadata_xml,omitempty"`

	// If enabled, the verification, if the `InResponseTo` parameter matches the original ID attribute
	// sent from ACP, is skipped.
	//
	// Enable the `skipInResponseToVerification` flag when the `InResponseTo` parameter is not
	// returned by your IDP.
	SkipInResponseToVerification bool `json:"skip_in_response_to_verification,omitempty" yaml:"skip_in_response_to_verification,omitempty"`

	// String represented SSO URL (endpoint) where the SAML request is sent
	// Example: https://test-dev-ed.my.salesforce.com/idp/endpoint/HttpPost
	SsoURL string `json:"sso_url,omitempty" yaml:"sso_url,omitempty"`

	// Name ID format of a SAML subject
	//
	// It applies only when the `identifierSource` parameter is set to `subject`.
	//
	// Allowed values:
	//
	// `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress`
	//
	// `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified`
	//
	// `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName`
	//
	// `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName`
	//
	// `urn:oasis:names:tc:SAML:2.0:nameid-format:encrypted`
	//
	// `urn:oasis:names:tc:SAML:2.0:nameid-format:entity`
	//
	// `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos`
	//
	// `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent`
	//
	// `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`
	//
	// default value:
	// `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent`
	SubjectNameIDFormat string `json:"subject_name_id_format,omitempty" yaml:"subject_name_id_format,omitempty"`
}

SAMLSettings SAML IDP specific settings

swagger:model SAMLSettings

func (*SAMLSettings) ContextValidate ¶

func (m *SAMLSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this s a m l settings based on context it is used

func (*SAMLSettings) MarshalBinary ¶

func (m *SAMLSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*SAMLSettings) UnmarshalBinary ¶

func (m *SAMLSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*SAMLSettings) Validate ¶

func (m *SAMLSettings) Validate(formats strfmt.Registry) error

Validate validates this s a m l settings

type SMSAuth ¶

type SMSAuth struct {

	// The Twilio Auth Token.
	// Required: true
	AuthToken string `json:"auth_token" yaml:"auth_token"`

	// The Twilio Account SID.
	// Required: true
	Sid string `json:"sid" yaml:"sid"`
}

SMSAuth s m s auth

swagger:model SMSAuth

func (*SMSAuth) ContextValidate ¶

func (m *SMSAuth) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this s m s auth based on context it is used

func (*SMSAuth) MarshalBinary ¶

func (m *SMSAuth) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*SMSAuth) UnmarshalBinary ¶

func (m *SMSAuth) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*SMSAuth) Validate ¶

func (m *SMSAuth) Validate(formats strfmt.Registry) error

Validate validates this s m s auth

type SMSSettings ¶

type SMSSettings struct {

	// Custom message template.
	//
	// If not set, the default is used.
	CustomMessageTemplate string `json:"custom_message_template,omitempty" yaml:"custom_message_template,omitempty"`

	// Custom SMS From phone number.
	//
	// If not set, the default is used.
	CustomSource string `json:"custom_source,omitempty" yaml:"custom_source,omitempty"`

	// otp
	Otp *OTPConfiguration `json:"otp,omitempty" yaml:"otp,omitempty"`

	// SMS provider.
	// Example: embedded
	// Enum: [twilio embedded]
	Provider string `json:"provider,omitempty" yaml:"provider,omitempty"`
}

SMSSettings s m s settings

swagger:model SMSSettings

func (*SMSSettings) ContextValidate ¶

func (m *SMSSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this s m s settings based on the context it is used

func (*SMSSettings) MarshalBinary ¶

func (m *SMSSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*SMSSettings) UnmarshalBinary ¶

func (m *SMSSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*SMSSettings) Validate ¶

func (m *SMSSettings) Validate(formats strfmt.Registry) error

Validate validates this s m s settings

type SPSSODescriptor ¶

type SPSSODescriptor struct {

	// artifact resolution services
	ArtifactResolutionServices []*IndexedEndpoint `json:"ArtifactResolutionServices" yaml:"ArtifactResolutionServices"`

	// assertion consumer services
	AssertionConsumerServices []*IndexedEndpoint `json:"AssertionConsumerServices" yaml:"AssertionConsumerServices"`

	// attribute consuming services
	AttributeConsumingServices []*AttributeConsumingService `json:"AttributeConsumingServices" yaml:"AttributeConsumingServices"`

	// authn requests signed
	AuthnRequestsSigned bool `json:"AuthnRequestsSigned,omitempty" yaml:"AuthnRequestsSigned,omitempty"`

	// cache duration
	CacheDuration Duration `json:"CacheDuration,omitempty" yaml:"CacheDuration,omitempty"`

	// contact people
	ContactPeople []*ContactPerson `json:"ContactPeople" yaml:"ContactPeople"`

	// error URL
	ErrorURL string `json:"ErrorURL,omitempty" yaml:"ErrorURL,omitempty"`

	// ID
	ID string `json:"ID,omitempty" yaml:"ID,omitempty"`

	// key descriptors
	KeyDescriptors []*KeyDescriptor `json:"KeyDescriptors" yaml:"KeyDescriptors"`

	// manage name ID services
	ManageNameIDServices []*Endpoint `json:"ManageNameIDServices" yaml:"ManageNameIDServices"`

	// name ID formats
	NameIDFormats []NameIDFormat `json:"NameIDFormats" yaml:"NameIDFormats"`

	// organization
	Organization *Organization `json:"Organization,omitempty" yaml:"Organization,omitempty"`

	// protocol support enumeration
	ProtocolSupportEnumeration string `json:"ProtocolSupportEnumeration,omitempty" yaml:"ProtocolSupportEnumeration,omitempty"`

	// signature
	Signature *Element `json:"Signature,omitempty" yaml:"Signature,omitempty"`

	// single logout services
	SingleLogoutServices []*Endpoint `json:"SingleLogoutServices" yaml:"SingleLogoutServices"`

	// valid until
	// Format: date-time
	ValidUntil strfmt.DateTime `json:"ValidUntil,omitempty" yaml:"ValidUntil,omitempty"`

	// want assertions signed
	WantAssertionsSigned bool `json:"WantAssertionsSigned,omitempty" yaml:"WantAssertionsSigned,omitempty"`

	// XML name
	XMLName *Name `json:"XMLName,omitempty" yaml:"XMLName,omitempty"`
}

SPSSODescriptor SPSSODescriptor represents the SAML SPSSODescriptorType object.

See http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf §2.4.2

swagger:model SPSSODescriptor

func (*SPSSODescriptor) ContextValidate ¶

func (m *SPSSODescriptor) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this s p s s o descriptor based on the context it is used

func (*SPSSODescriptor) MarshalBinary ¶

func (m *SPSSODescriptor) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*SPSSODescriptor) UnmarshalBinary ¶

func (m *SPSSODescriptor) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*SPSSODescriptor) Validate ¶

func (m *SPSSODescriptor) Validate(formats strfmt.Registry) error

Validate validates this s p s s o descriptor

type SSOConfiguration ¶

type SSOConfiguration struct {

	// Domain for the SSO cookie
	Domain string `json:"domain,omitempty" yaml:"domain,omitempty"`

	// If enabled, single-sign-on (SSO) is active for all IDPs in this workspace.
	// Example: false
	Enabled bool `json:"enabled,omitempty" yaml:"enabled,omitempty"`

	// Additional domains permitted in the logout redirect_to parameter
	LogoutRedirectDomains []string `json:"logout_redirect_domains" yaml:"logout_redirect_domains"`

	// Active TTL - Active SSO sessions expire after MaxAge nanoseconds.
	// Format: duration
	MaxAge strfmt.Duration `json:"max_age,omitempty" yaml:"max_age,omitempty"`

	// Idle TTL - Idle SSO sessions expire after MaxIdle nanoseconds.
	// Format: duration
	MaxIdle strfmt.Duration `json:"max_idle,omitempty" yaml:"max_idle,omitempty"`

	// Admin-configured target URL after logout, if redirect_to omitted or invalid
	PostLogoutURL string `json:"post_logout_url,omitempty" yaml:"post_logout_url,omitempty"`
}

SSOConfiguration s s o configuration

swagger:model SSOConfiguration

func (*SSOConfiguration) ContextValidate ¶

func (m *SSOConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this s s o configuration based on context it is used

func (*SSOConfiguration) MarshalBinary ¶

func (m *SSOConfiguration) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*SSOConfiguration) UnmarshalBinary ¶

func (m *SSOConfiguration) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*SSOConfiguration) Validate ¶

func (m *SSOConfiguration) Validate(formats strfmt.Registry) error

Validate validates this s s o configuration

type SchemaAuditPayload ¶

type SchemaAuditPayload struct {

	// created at
	// Format: date-time
	CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"`

	// description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// name
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// schema id
	SchemaID string `json:"schema_id,omitempty" yaml:"schema_id,omitempty"`

	// system
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// updated at
	// Format: date-time
	UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"`
}

SchemaAuditPayload schema audit payload

swagger:model SchemaAuditPayload

func (*SchemaAuditPayload) ContextValidate ¶

func (m *SchemaAuditPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this schema audit payload based on context it is used

func (*SchemaAuditPayload) MarshalBinary ¶

func (m *SchemaAuditPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*SchemaAuditPayload) UnmarshalBinary ¶

func (m *SchemaAuditPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*SchemaAuditPayload) Validate ¶

func (m *SchemaAuditPayload) Validate(formats strfmt.Registry) error

Validate validates this schema audit payload

type Scope ¶

type Scope struct {

	// Authorization server identifier
	// Example: my-server
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// The scope description displayed as a hint on a consent page
	// Example: This scope value requests offline access using refresh token
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// The scope name displayed on a consent page
	// Example: Offline Access
	DisplayName string `json:"display_name,omitempty" yaml:"display_name,omitempty"`

	// Scope identifier
	// Example: scope-1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// Request this scope by default for all clients who subscribed to this scope
	Implicit bool `json:"implicit,omitempty" yaml:"implicit,omitempty"`

	// metadata
	Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// Scope name
	// Example: offline_access
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Tenant identifier
	// Example: my-company
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// Disable storage of scope grants
	Transient bool `json:"transient,omitempty" yaml:"transient,omitempty"`
}

Scope scope

swagger:model Scope

func (*Scope) ContextValidate ¶

func (m *Scope) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this scope based on the context it is used

func (*Scope) MarshalBinary ¶

func (m *Scope) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Scope) UnmarshalBinary ¶

func (m *Scope) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Scope) Validate ¶

func (m *Scope) Validate(formats strfmt.Registry) error

Validate validates this scope

type ScopeGrant ¶

type ScopeGrant struct {

	// Identifier of a client application that is granted with the scope.
	// Example: bugkgm23g9kregtu051g
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// Time when the scope was granted
	// Format: date-time
	GivenAt strfmt.DateTime `json:"given_at,omitempty" yaml:"given_at,omitempty"`

	// The scope name with its actual value
	// Example: accounts.read.own
	GrantedScopeName string `json:"granted_scope_name,omitempty" yaml:"granted_scope_name,omitempty"`

	// Language
	Language string `json:"language,omitempty" yaml:"language,omitempty"`

	// The scope name as it's set initially. This parameter supports dynamic scope syntax, thus can include a scope
	// root—a fixed core of the dynamic scope name supplemented with a wildcard—a symbol representing
	// an adjustable extension to the scope root allowing to retrieve a specific requested scope.
	//
	// The basic dynamic scope template is as follows: `[scope-root.*]` where `*` is a wildcard.
	// Example: accounts.read.*
	ScopeName string `json:"scope_name,omitempty" yaml:"scope_name,omitempty"`

	// Identifier of a server where the client app is hosted.
	// Example: my-server
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// Identifier of a user who granted the scope.
	Subject string `json:"subject,omitempty" yaml:"subject,omitempty"`

	// Identifier of the tenant where the client app is hosted.
	// Example: my-company
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`
}

ScopeGrant scope grant

swagger:model ScopeGrant

func (*ScopeGrant) ContextValidate ¶

func (m *ScopeGrant) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this scope grant based on context it is used

func (*ScopeGrant) MarshalBinary ¶

func (m *ScopeGrant) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ScopeGrant) UnmarshalBinary ¶

func (m *ScopeGrant) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ScopeGrant) Validate ¶

func (m *ScopeGrant) Validate(formats strfmt.Registry) error

Validate validates this scope grant

type ScopePrivacyInformation ¶

type ScopePrivacyInformation struct {

	// pii categories
	PiiCategories []*PIICategory `json:"pii_categories" yaml:"pii_categories"`

	// purpose
	Purpose string `json:"purpose,omitempty" yaml:"purpose,omitempty"`
}

ScopePrivacyInformation scope privacy information

swagger:model ScopePrivacyInformation

func (*ScopePrivacyInformation) ContextValidate ¶

func (m *ScopePrivacyInformation) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this scope privacy information based on the context it is used

func (*ScopePrivacyInformation) MarshalBinary ¶

func (m *ScopePrivacyInformation) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ScopePrivacyInformation) UnmarshalBinary ¶

func (m *ScopePrivacyInformation) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ScopePrivacyInformation) Validate ¶

func (m *ScopePrivacyInformation) Validate(formats strfmt.Registry) error

Validate validates this scope privacy information

type ScopeWithService ¶

type ScopeWithService struct {

	// Authorization server identifier
	// Example: my-server
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// The scope description displayed as a hint on a consent page
	// Example: This scope value requests offline access using refresh token
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// The scope name displayed on a consent page
	// Example: Offline Access
	DisplayName string `json:"display_name,omitempty" yaml:"display_name,omitempty"`

	// Scope identifier
	// Example: scope-1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// Request this scope by default for all clients who subscribed to this scope
	Implicit bool `json:"implicit,omitempty" yaml:"implicit,omitempty"`

	// metadata
	Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// Scope name
	// Example: offline_access
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// service
	Service *Service `json:"service,omitempty" yaml:"service,omitempty"`

	// Tenant identifier
	// Example: my-company
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// Disable storage of scope grants
	Transient bool `json:"transient,omitempty" yaml:"transient,omitempty"`

	// with service
	WithService bool `json:"with_service,omitempty" yaml:"with_service,omitempty"`
}

ScopeWithService scope with service

swagger:model ScopeWithService

func (*ScopeWithService) ContextValidate ¶

func (m *ScopeWithService) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this scope with service based on the context it is used

func (*ScopeWithService) MarshalBinary ¶

func (m *ScopeWithService) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ScopeWithService) UnmarshalBinary ¶

func (m *ScopeWithService) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ScopeWithService) Validate ¶

func (m *ScopeWithService) Validate(formats strfmt.Registry) error

Validate validates this scope with service

type ScopeWithServiceID ¶

type ScopeWithServiceID struct {

	// Authorization server identifier
	// Example: my-server
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// The scope description displayed as a hint on a consent page
	// Example: This scope value requests offline access using refresh token
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// The scope name displayed on a consent page
	// Example: Offline Access
	DisplayName string `json:"display_name,omitempty" yaml:"display_name,omitempty"`

	// Scope identifier
	// Example: scope-1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// Request this scope by default for all clients who subscribed to this scope
	Implicit bool `json:"implicit,omitempty" yaml:"implicit,omitempty"`

	// metadata
	Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// Scope name
	// Example: offline_access
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// optional service id
	// Example: 1
	ServiceID string `json:"service_id,omitempty" yaml:"service_id,omitempty"`

	// Tenant identifier
	// Example: my-company
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// Disable storage of scope grants
	Transient bool `json:"transient,omitempty" yaml:"transient,omitempty"`
}

ScopeWithServiceID scope with service ID

swagger:model ScopeWithServiceID

func (*ScopeWithServiceID) ContextValidate ¶

func (m *ScopeWithServiceID) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this scope with service ID based on the context it is used

func (*ScopeWithServiceID) MarshalBinary ¶

func (m *ScopeWithServiceID) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ScopeWithServiceID) UnmarshalBinary ¶

func (m *ScopeWithServiceID) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ScopeWithServiceID) Validate ¶

func (m *ScopeWithServiceID) Validate(formats strfmt.Registry) error

Validate validates this scope with service ID

type ScopesGrantedPayload ¶

type ScopesGrantedPayload struct {

	// List of scopes to grant.
	NewScopeGrants []*ScopeGrant `json:"new_scope_grants" yaml:"new_scope_grants"`
}

ScopesGrantedPayload scopes granted payload

swagger:model ScopesGrantedPayload

func (*ScopesGrantedPayload) ContextValidate ¶

func (m *ScopesGrantedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this scopes granted payload based on the context it is used

func (*ScopesGrantedPayload) MarshalBinary ¶

func (m *ScopesGrantedPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ScopesGrantedPayload) UnmarshalBinary ¶

func (m *ScopesGrantedPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ScopesGrantedPayload) Validate ¶

func (m *ScopesGrantedPayload) Validate(formats strfmt.Registry) error

Validate validates this scopes granted payload

type ScopesWithServices ¶

type ScopesWithServices struct {

	// scopes
	Scopes []*ScopeWithService `json:"scopes" yaml:"scopes"`
}

ScopesWithServices scopes with services

swagger:model ScopesWithServices

func (*ScopesWithServices) ContextValidate ¶

func (m *ScopesWithServices) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this scopes with services based on the context it is used

func (*ScopesWithServices) MarshalBinary ¶

func (m *ScopesWithServices) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ScopesWithServices) UnmarshalBinary ¶

func (m *ScopesWithServices) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ScopesWithServices) Validate ¶

func (m *ScopesWithServices) Validate(formats strfmt.Registry) error

Validate validates this scopes with services

type Script ¶

type Script struct {

	// ID of the authorization server (workspace) where the script is created
	// Required: true
	AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"`

	// Script body
	Body string `json:"body,omitempty" yaml:"body,omitempty"`

	// Unique ID of your script
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// Display name of your script
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// ID of the tenant where the script is created
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// Input data for testing this script
	TestInput string `json:"test_input,omitempty" yaml:"test_input,omitempty"`
}

Script script

swagger:model Script

func (*Script) ContextValidate ¶

func (m *Script) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this script based on context it is used

func (*Script) MarshalBinary ¶

func (m *Script) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Script) UnmarshalBinary ¶

func (m *Script) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Script) Validate ¶

func (m *Script) Validate(formats strfmt.Registry) error

Validate validates this script

type ScriptDebug ¶

type ScriptDebug struct {

	// ID of the authorization server (workspace) where the script is created
	// Required: true
	AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"`

	// Expiration interval
	// Example: 60s
	// Format: duration
	Duration strfmt.Duration `json:"duration,omitempty" yaml:"duration,omitempty"`

	// ID of the script to be debugged
	// Required: true
	ScriptID string `json:"script_id" yaml:"script_id"`

	// Time that script debugging was enabled
	// Format: date-time
	StartedAt strfmt.DateTime `json:"started_at,omitempty" yaml:"started_at,omitempty"`

	// ID of the tenant where the script is created
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`
}

ScriptDebug script debug

swagger:model ScriptDebug

func (*ScriptDebug) ContextValidate ¶

func (m *ScriptDebug) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this script debug based on context it is used

func (*ScriptDebug) MarshalBinary ¶

func (m *ScriptDebug) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ScriptDebug) UnmarshalBinary ¶

func (m *ScriptDebug) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ScriptDebug) Validate ¶

func (m *ScriptDebug) Validate(formats strfmt.Registry) error

Validate validates this script debug

type ScriptDebugs ¶

type ScriptDebugs struct {

	// list of script debug triggers
	ScriptDebugs []*ScriptDebug `json:"script_debugs" yaml:"script_debugs"`
}

ScriptDebugs script debugs

swagger:model ScriptDebugs

func (*ScriptDebugs) ContextValidate ¶

func (m *ScriptDebugs) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this script debugs based on the context it is used

func (*ScriptDebugs) MarshalBinary ¶

func (m *ScriptDebugs) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ScriptDebugs) UnmarshalBinary ¶

func (m *ScriptDebugs) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ScriptDebugs) Validate ¶

func (m *ScriptDebugs) Validate(formats strfmt.Registry) error

Validate validates this script debugs

type ScriptExecutionAuditPayload ¶

type ScriptExecutionAuditPayload struct {

	// caught err
	CaughtErr string `json:"caught_err,omitempty" yaml:"caught_err,omitempty"`

	// duration
	// Format: duration
	Duration strfmt.Duration `json:"duration,omitempty" yaml:"duration,omitempty"`

	// error
	Error string `json:"error,omitempty" yaml:"error,omitempty"`

	// executed at
	// Format: date-time
	ExecutedAt strfmt.DateTime `json:"executed_at,omitempty" yaml:"executed_at,omitempty"`

	// execution point
	// Enum: [post_authn_ctx allowed_idp_ids token_minting client_token_minting]
	ExecutionPoint string `json:"execution_point,omitempty" yaml:"execution_point,omitempty"`

	// input
	Input map[string]interface{} `json:"input,omitempty" yaml:"input,omitempty"`

	// log level
	LogLevel string `json:"log_level,omitempty" yaml:"log_level,omitempty"`

	// output
	Output map[string]interface{} `json:"output,omitempty" yaml:"output,omitempty"`

	// script id
	ScriptID string `json:"script_id,omitempty" yaml:"script_id,omitempty"`

	// script name
	ScriptName string `json:"script_name,omitempty" yaml:"script_name,omitempty"`

	// stderr
	Stderr string `json:"stderr,omitempty" yaml:"stderr,omitempty"`

	// stdout
	Stdout string `json:"stdout,omitempty" yaml:"stdout,omitempty"`
}

ScriptExecutionAuditPayload script execution audit payload

swagger:model ScriptExecutionAuditPayload

func (*ScriptExecutionAuditPayload) ContextValidate ¶

func (m *ScriptExecutionAuditPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this script execution audit payload based on context it is used

func (*ScriptExecutionAuditPayload) MarshalBinary ¶

func (m *ScriptExecutionAuditPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ScriptExecutionAuditPayload) UnmarshalBinary ¶

func (m *ScriptExecutionAuditPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ScriptExecutionAuditPayload) Validate ¶

func (m *ScriptExecutionAuditPayload) Validate(formats strfmt.Registry) error

Validate validates this script execution audit payload

type ScriptExecutionPoint ¶

type ScriptExecutionPoint struct {

	// Optional script ID
	// Example: 1
	ScriptID string `json:"script_id,omitempty" yaml:"script_id,omitempty"`

	// The ID of your authorization server (workspace)
	// Example: default
	// Required: true
	ServerID string `json:"server_id" yaml:"server_id"`

	// String representation of the target's ID
	// Example: 1
	// Required: true
	TargetFk string `json:"target_fk" yaml:"target_fk"`

	// The ID of your tenant
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// String representation of the script execution point type
	// Example: post_authn_ctx
	// Required: true
	// Enum: [post_authn_ctx allowed_idp_ids token_minting client_token_minting]
	Type string `json:"type" yaml:"type"`
}

ScriptExecutionPoint script execution point

swagger:model ScriptExecutionPoint

func (*ScriptExecutionPoint) ContextValidate ¶

func (m *ScriptExecutionPoint) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this script execution point based on context it is used

func (*ScriptExecutionPoint) MarshalBinary ¶

func (m *ScriptExecutionPoint) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ScriptExecutionPoint) UnmarshalBinary ¶

func (m *ScriptExecutionPoint) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ScriptExecutionPoint) Validate ¶

func (m *ScriptExecutionPoint) Validate(formats strfmt.Registry) error

Validate validates this script execution point

type ScriptExecutionPoints ¶

type ScriptExecutionPoints struct {

	// list of script executions
	ExecutionPoints []*ScriptExecutionPoint `json:"execution_points" yaml:"execution_points"`
}

ScriptExecutionPoints script execution points

swagger:model ScriptExecutionPoints

func (*ScriptExecutionPoints) ContextValidate ¶

func (m *ScriptExecutionPoints) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this script execution points based on the context it is used

func (*ScriptExecutionPoints) MarshalBinary ¶

func (m *ScriptExecutionPoints) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ScriptExecutionPoints) UnmarshalBinary ¶

func (m *ScriptExecutionPoints) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ScriptExecutionPoints) Validate ¶

func (m *ScriptExecutionPoints) Validate(formats strfmt.Registry) error

Validate validates this script execution points

type ScriptExecutionResult ¶

type ScriptExecutionResult struct {

	// name of the error
	CaughtErr string `json:"caught_err,omitempty" yaml:"caught_err,omitempty"`

	// script execution time
	// Format: duration
	Duration strfmt.Duration `json:"duration,omitempty" yaml:"duration,omitempty"`

	// script id
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// script input
	Input map[string]interface{} `json:"input,omitempty" yaml:"input,omitempty"`

	// script output
	Output map[string]interface{} `json:"output,omitempty" yaml:"output,omitempty"`

	// script standard error, e.g. console.error()
	Stderr string `json:"stderr,omitempty" yaml:"stderr,omitempty"`

	// script standard output, e.g. console.log()
	Stdout string `json:"stdout,omitempty" yaml:"stdout,omitempty"`
}

ScriptExecutionResult script execution result

swagger:model ScriptExecutionResult

func (*ScriptExecutionResult) ContextValidate ¶

func (m *ScriptExecutionResult) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this script execution result based on context it is used

func (*ScriptExecutionResult) MarshalBinary ¶

func (m *ScriptExecutionResult) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ScriptExecutionResult) UnmarshalBinary ¶

func (m *ScriptExecutionResult) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ScriptExecutionResult) Validate ¶

func (m *ScriptExecutionResult) Validate(formats strfmt.Registry) error

Validate validates this script execution result

type ScriptRuntime ¶

type ScriptRuntime struct {

	// dependencies
	Dependencies map[string]string `json:"dependencies,omitempty" yaml:"dependencies,omitempty"`

	// version
	Version string `json:"version,omitempty" yaml:"version,omitempty"`
}

ScriptRuntime script runtime

swagger:model ScriptRuntime

func (*ScriptRuntime) ContextValidate ¶

func (m *ScriptRuntime) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this script runtime based on context it is used

func (*ScriptRuntime) MarshalBinary ¶

func (m *ScriptRuntime) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ScriptRuntime) UnmarshalBinary ¶

func (m *ScriptRuntime) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ScriptRuntime) Validate ¶

func (m *ScriptRuntime) Validate(formats strfmt.Registry) error

Validate validates this script runtime

type Scripts ¶

type Scripts struct {

	// list of scripts
	Scripts []*Script `json:"scripts" yaml:"scripts"`
}

Scripts scripts

swagger:model Scripts

func (*Scripts) ContextValidate ¶

func (m *Scripts) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this scripts based on the context it is used

func (*Scripts) MarshalBinary ¶

func (m *Scripts) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Scripts) UnmarshalBinary ¶

func (m *Scripts) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Scripts) Validate ¶

func (m *Scripts) Validate(formats strfmt.Registry) error

Validate validates this scripts

type Secret ¶

type Secret struct {

	// Time when the secret was created
	// Format: date-time
	CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"`

	// Unique ID of your secret
	// Example: secret-pet
	// Required: true
	ID string `json:"id" yaml:"id"`

	// Value of a secret
	// Example: cat
	// Required: true
	Secret string `json:"secret" yaml:"secret"`

	// ID of your authorization server (workspace)
	// Example: default
	// Required: true
	ServerID string `json:"server_id" yaml:"server_id"`

	// ID of your tenant
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// value
	Value string `json:"value,omitempty" yaml:"value,omitempty"`
}

Secret secret

swagger:model Secret

func (*Secret) ContextValidate ¶

func (m *Secret) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this secret based on context it is used

func (*Secret) MarshalBinary ¶

func (m *Secret) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Secret) UnmarshalBinary ¶

func (m *Secret) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Secret) Validate ¶

func (m *Secret) Validate(formats strfmt.Registry) error

Validate validates this secret

type SecretsResponse ¶

type SecretsResponse struct {

	// secrets
	Secrets []*Secret `json:"secrets" yaml:"secrets"`
}

SecretsResponse secrets response

swagger:model SecretsResponse

func (*SecretsResponse) ContextValidate ¶

func (m *SecretsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this secrets response based on the context it is used

func (*SecretsResponse) MarshalBinary ¶

func (m *SecretsResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*SecretsResponse) UnmarshalBinary ¶

func (m *SecretsResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*SecretsResponse) Validate ¶

func (m *SecretsResponse) Validate(formats strfmt.Registry) error

Validate validates this secrets response

type Server ¶

type Server struct {

	// Access token strategy
	//
	// You can choose to go either with `JWT` or `opaque` tokens.
	//
	// The content of JSON Web Tokens is readable and it is possible to be decoded by anyone that
	// has a secret or a public key in their possession.
	//
	// Opaque tokens are in a proprietary form that contains an identifier to information stored on
	// the athorization server. To validate an opaque token, the recipient must call the server that
	// issued the token.
	// Example: jwt
	// Enum: [jwt opaque]
	AccessTokenStrategy string `json:"access_token_strategy,omitempty" yaml:"access_token_strategy,omitempty"`

	// Access token time to live
	//
	// After an access token reaches its time to live, it expires and it cannot be used to
	// authenticate the client application.
	// Example: 1h10m30s
	// Format: duration
	AccessTokenTTL strfmt.Duration `json:"access_token_ttl,omitempty" yaml:"access_token_ttl,omitempty"`

	// advanced
	Advanced *AdvancedConfiguration `json:"advanced,omitempty" yaml:"advanced,omitempty"`

	// authentication context settings
	AuthenticationContextSettings *AuthenticationContextSettings `json:"authentication_context_settings,omitempty" yaml:"authentication_context_settings,omitempty"`

	// Authorization code time to live
	//
	// After an authorization code reaches its time to live, it expires and it cannot be used to
	// authorize the request to the `/token` endpoint.
	// Example: 10m0s
	// Format: duration
	AuthorizationCodeTTL strfmt.Duration `json:"authorization_code_ttl,omitempty" yaml:"authorization_code_ttl,omitempty"`

	// backchannel token delivery modes supported
	BackchannelTokenDeliveryModesSupported []string `json:"backchannel_token_delivery_modes_supported" yaml:"backchannel_token_delivery_modes_supported"`

	// backchannel user code parameter supported
	BackchannelUserCodeParameterSupported bool `json:"backchannel_user_code_parameter_supported,omitempty" yaml:"backchannel_user_code_parameter_supported,omitempty"`

	// cdr
	Cdr *CDRConfiguration `json:"cdr,omitempty" yaml:"cdr,omitempty"`

	// Your server's label color in a HEX format.
	// Example: #007FFF
	Color string `json:"color,omitempty" yaml:"color,omitempty"`

	// Namespace used when creating Open Banking Brasil consent IDs
	//
	// Consent IDs will have the form of urn:<consent_id_namespace>:<uid> when this is set.
	// If this is empty, the tenant id is used by default
	ConsentIDNamespace string `json:"consent_id_namespace,omitempty" yaml:"consent_id_namespace,omitempty"`

	// Cookie max age
	//
	// Defines how long a cookie can live until it expires.
	// Example: 1h10m30s
	// Format: duration
	CookieMaxAge strfmt.Duration `json:"cookie_max_age,omitempty" yaml:"cookie_max_age,omitempty"`

	// Defines a custom issuer URL that can be used as the value of the `iss` claim in an access
	// token.
	//
	// If not provided, it is built dynamically based on the server's URL.
	// Example: http://example.com/default/default
	CustomIssuerURL string `json:"custom_issuer_url,omitempty" yaml:"custom_issuer_url,omitempty"`

	// Display description of the workspace
	// Example: Server description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// device authorization
	DeviceAuthorization *DeviceAuthorizationConfiguration `json:"device_authorization,omitempty" yaml:"device_authorization,omitempty"`

	// dynamic client registration
	DynamicClientRegistration *DynamicClientRegistrationSettings `json:"dynamic_client_registration,omitempty" yaml:"dynamic_client_registration,omitempty"`

	// You can use this property to define a separator that is used for dynamic scopes.
	//
	// For example, the default separator is `.`, so the scope could look like the following:
	// `users.*`.
	//
	// For Open Banking Brazil compliant servers, the `:` separator should be used.
	DynamicScopeSeparator string `json:"dynamic_scope_separator,omitempty" yaml:"dynamic_scope_separator,omitempty"`

	// Deprecated: Use IDPDiscovery instead
	//
	// If enabled, IDP discovery automatically redirects the user to their own IDP and does not
	// display IDPs of other users while the users accesses the server/application.
	// Example: false
	EnableIdpDiscovery bool `json:"enable_idp_discovery,omitempty" yaml:"enable_idp_discovery,omitempty"`

	// Deprecated
	//
	// If enabled, it is possible to manually register clients withouth the use of software
	// statements.
	//
	// This flag is enabled, when the `enable_trust_anchor` flag is set to `false`. You can disable
	// it using API, but it cannot be manually enabled.
	EnableLegacyClientsWithNoSoftwareStatement bool `` /* 131-byte string literal not displayed */

	// If enabled, the server is visible on the Quick Access tab on the login page.
	EnableQuickAccess bool `json:"enable_quick_access,omitempty" yaml:"enable_quick_access,omitempty"`

	// If enabled, it makes it obligatory to provide a software statement signed by a trusted certificate authority
	//
	// when registering a client application with the use of the Dynamic Client Registration (DCR).
	//
	// In public key infrastructure (PKI), trust anchors are certification authorities. They are
	// represented by a certificate that is used to verify the signature of a certificate issued by
	// a particular trust anchor.
	EnableTrustAnchor bool `json:"enable_trust_anchor,omitempty" yaml:"enable_trust_anchor,omitempty"`

	// When enabled, the authorization server will enforce encrypted id tokens it issues
	EnforceIDTokenEncryption bool `json:"enforce_id_token_encryption,omitempty" yaml:"enforce_id_token_encryption,omitempty"`

	// Define whether you want to enforce using the Proof Key of Code Exchange (PKCE) for both
	// private and public clients.
	//
	// PKCE is an OAuth security extension that prevents malicious applications or codes that
	// intercepted authorization code from exchanging it for an access token.
	// Example: false
	EnforcePkce bool `json:"enforce_pkce,omitempty" yaml:"enforce_pkce,omitempty"`

	// Define whether you want to enforce using the Proof Key of Code Exchange (PKCE) for
	// public clients.
	//
	// Public clients, like mobile applications or JavaScript-based applications, by their design,
	// cannot store client secrets securely. For such clients, even encrypting the client secret
	// inside the application’s code is not a reliable way of protecting secrets as the application
	// can be decompiled and the client secret can be extracted while it is decrypted in the memory
	// of the application.
	//
	// For those reasons, ACP supports the use of PKCE as an addition to the authorization code
	// grant flow to provide a secure alternative to the implicit grant flow.
	// Example: false
	EnforcePkceForPublicClients bool `json:"enforce_pkce_for_public_clients,omitempty" yaml:"enforce_pkce_for_public_clients,omitempty"`

	// fdx
	Fdx *FDXConfiguration `json:"fdx,omitempty" yaml:"fdx,omitempty"`

	// An array that defines which of the OAuth 2.0 grant types are enabled for the authorization server.
	// Example: ["authorization_code","implicit","refresh_token","client_credentials"]
	GrantTypes []string `json:"grant_types" yaml:"grant_types"`

	// Unique identifier of an authorization server (workspace)
	//
	// If not provided, a random ID is generated.
	// Example: default
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID token time to live
	//
	// After an ID token reaches its time to live, it expires and it cannot be used to provide
	// user profile information to a client application.
	// Example: 1h10m30s
	// Format: duration
	IDTokenTTL strfmt.Duration `json:"id_token_ttl,omitempty" yaml:"id_token_ttl,omitempty"`

	// identity assurance
	IdentityAssurance *IdentityAssuranceConfiguration `json:"identity_assurance,omitempty" yaml:"identity_assurance,omitempty"`

	// idp discovery
	IdpDiscovery *IDPDiscovery `json:"idp_discovery,omitempty" yaml:"idp_discovery,omitempty"`

	// Issuer ID that will be used to set `iss` claim on signed messages
	//
	// If issuer_id is not set then default issuer_url will be used
	// Example: 5647fe90-f6bc-11eb-9a03-0242ac130003
	IssuerID string `json:"issuer_id,omitempty" yaml:"issuer_id,omitempty"`

	// jwks
	Jwks *ServerJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"`

	// Determines which type of asymmetric algorithms (RSA or ECDSA) is used to generate keys for signing access and
	// ID tokens.
	//
	// It is used only as an input parameter for the Create Authorization Server API.
	// Example: rsa
	// Enum: [rsa ecdsa ps]
	KeyType string `json:"key_type,omitempty" yaml:"key_type,omitempty"`

	// legal entity
	LegalEntity *LegalEntity `json:"legal_entity,omitempty" yaml:"legal_entity,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// metadata
	Metadata *ServerMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// Display name of the workspace
	//
	// If not provided, a random ID is generated.
	// Example: default
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// obbr
	Obbr *OBBRConfiguration `json:"obbr,omitempty" yaml:"obbr,omitempty"`

	// organization
	Organization *OrganizationConfiguration `json:"organization,omitempty" yaml:"organization,omitempty"`

	// Optional ID of a parent server
	ParentID string `json:"parent_id,omitempty" yaml:"parent_id,omitempty"`

	// The profile of a server
	//
	// ACP is delivered with preconfigured workspace templates that enable quick and easy setup for
	// specific configuration patterns. For example, you can instantly create an Open Banking
	// compliant workspace that has all of the required mechanisms and settings already in place.
	// Example: default
	// Enum: [default demo workforce consumer partners third_party fapi_advanced fapi_rw fapi_ro openbanking_uk_fapi_advanced openbanking_uk openbanking_br cdr_australia cdr_australia_fapi_rw fdx openbanking_ksa fapi_20_security fapi_20_message_signing connect_id]
	Profile string `json:"profile,omitempty" yaml:"profile,omitempty"`

	// Custom pushed authentication request TTL
	// If not provided, TTL is set to 60 seconds.
	// Format: duration
	PushedAuthorizationRequestTTL strfmt.Duration `json:"pushed_authorization_request_ttl,omitempty" yaml:"pushed_authorization_request_ttl,omitempty"`

	// Refresh token time to live
	//
	// After a refresh token reaches its time to live, it expires and it cannot be used to obtain
	// new access tokens for a client application.
	// Example: 720h0m0s
	// Format: duration
	RefreshTokenTTL strfmt.Duration `json:"refresh_token_ttl,omitempty" yaml:"refresh_token_ttl,omitempty"`

	// Boolean parameter indicating whether the authorization server accepts authorization request data only via PAR.
	RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"`

	// response types
	ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"`

	// You can provide root Certificate Authority (CA) certificates encoded to the Privacy-Enhanced
	// Mail (PEM) file format which are used for the `tls_client_auth` and the
	// `self_signed_tls_client_auth` client authentication methods that use the Mutual
	// Transport Layer Security (mTLS).
	//
	// If not set, the system root CA certifiates are used instead.
	RootCas string `json:"root_cas,omitempty" yaml:"root_cas,omitempty"`

	// An array of rotated secrets that are still used to validate tokens
	// Example: ["jFpwIvuKJP46J71WqszPv1SrzoUr-cSILP9EPdlClB4"]
	RotatedSecrets []string `json:"rotated_secrets" yaml:"rotated_secrets"`

	// saml
	Saml *SAMLConfiguration `json:"saml,omitempty" yaml:"saml,omitempty"`

	// Secret used for hashing
	//
	// It must have at least 32 characters. If not provided, it is generated.
	// Example: hW5WhKX_7w7BLwUQ6mn7Cp70_OoKI_F1y1hLS5U8lIU
	Secret string `json:"secret,omitempty" yaml:"secret,omitempty"`

	// sso
	Sso *SSOConfiguration `json:"sso,omitempty" yaml:"sso,omitempty"`

	// styling
	Styling *Styling `json:"styling,omitempty" yaml:"styling,omitempty"`

	// Define the format of a subject
	// When set to hash sub value is a one way hash of idp id and idp sub
	// Enum: [hash legacy]
	SubjectFormat string `json:"subject_format,omitempty" yaml:"subject_format,omitempty"`

	// Salt used to hash `subject` when the `pairwise` subject type is used.
	//
	// Salt is a random data which is used as an additional input to one-way functions that hashes
	// data, passwords, and, in this case, subjects.
	//
	// It is recommended that your salt value is long for security reasons. Preferably, the salt
	// value should be at least the same length as the output of the hash.
	//
	// If not provided, it is generated.
	SubjectIdentifierAlgorithmSalt string `json:"subject_identifier_algorithm_salt,omitempty" yaml:"subject_identifier_algorithm_salt,omitempty"`

	// An array that defines supported subject identifier types.
	//
	// Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer,
	// and are intended to be consumed by client applications. There are two types
	// of subject identifiers: `public` and `pairwise`.
	//
	// `public` identifiers provide the same `sub` claim value to all client applications.
	// `pairwise` identifiers provide different `sub` claim values to each client application. With
	// this approach, it makes it impossible for client applications to correlate the end-user's
	// activity without their permission.
	// Example: ["public","pairwise"]
	SubjectIdentifierTypes []string `json:"subject_identifier_types" yaml:"subject_identifier_types"`

	// If true this workspace can be used as a template when creating a new ones.
	Template bool `json:"template,omitempty" yaml:"template,omitempty"`

	// ID of a tenant
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// An array that lists all of the supported token endpoint authentication methods for the
	// authorization server.
	TokenEndpointAuthMethods []string `json:"token_endpoint_auth_methods" yaml:"token_endpoint_auth_methods"`

	// Token endpoint auth signing supported alg values
	//
	// Supported algorithms: HS256, RS256, ES256, PS256
	//
	// At least one algorithm must be set.
	//
	// The default values depends on the server security profile.
	TokenEndpointAuthSigningAlgValues []string `json:"token_endpoint_auth_signing_alg_values" yaml:"token_endpoint_auth_signing_alg_values"`

	// Deprecated: Use TokenEndpointAuthMethods instead
	TokenEndpointAuthnMethods []string `json:"token_endpoint_authn_methods" yaml:"token_endpoint_authn_methods"`

	// trust anchor configuration
	TrustAnchorConfiguration *TrustAnchorConfiguration `json:"trust_anchor_configuration,omitempty" yaml:"trust_anchor_configuration,omitempty"`

	// Server type
	//
	// It is an internal property used to recognize if the server is created for an admin portal,
	// a developer portal, or if it is a system or a regular workspace.
	// Example: regular
	// Enum: [admin developer system regular organization]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// server version to track internal changes
	// version that is currently the latest: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`
}

Server Multi Tenant authorization server

swagger:model Server

func (*Server) ContextValidate ¶

func (m *Server) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this server based on the context it is used

func (*Server) MarshalBinary ¶

func (m *Server) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Server) UnmarshalBinary ¶

func (m *Server) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Server) Validate ¶

func (m *Server) Validate(formats strfmt.Registry) error

Validate validates this server

type ServerAPIs ¶

type ServerAPIs struct {

	// apis by services
	ApisByServices map[string][]API `json:"apis_by_services,omitempty" yaml:"apis_by_services,omitempty"`
}

ServerAPIs server a p is

swagger:model ServerAPIs

func (*ServerAPIs) ContextValidate ¶

func (m *ServerAPIs) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this server a p is based on the context it is used

func (*ServerAPIs) MarshalBinary ¶

func (m *ServerAPIs) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServerAPIs) UnmarshalBinary ¶

func (m *ServerAPIs) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServerAPIs) Validate ¶

func (m *ServerAPIs) Validate(formats strfmt.Registry) error

Validate validates this server a p is

type ServerAuditPayload ¶

type ServerAuditPayload struct {

	// Access token strategy
	//
	// You can choose to go either with `JWT` or `opaque` tokens.
	//
	// The content of JSON Web Tokens is readable and it is possible to be decoded by anyone that
	// has a secret or a public key in their possession.
	//
	// Opaque tokens are in a proprietary form that contains an identifier to information stored on
	// the athorization server. To validate an opaque token, the recipient must call the server that
	// issued the token.
	// Example: jwt
	// Enum: [jwt opaque]
	AccessTokenStrategy string `json:"access_token_strategy,omitempty" yaml:"access_token_strategy,omitempty"`

	// Access token time to live
	//
	// After an access token reaches its time to live, it expires and it cannot be used to
	// authenticate the client application.
	// Example: 1h10m30s
	// Format: duration
	AccessTokenTTL strfmt.Duration `json:"access_token_ttl,omitempty" yaml:"access_token_ttl,omitempty"`

	// advanced
	Advanced *AdvancedConfiguration `json:"advanced,omitempty" yaml:"advanced,omitempty"`

	// authentication context settings
	AuthenticationContextSettings *AuthenticationContextSettings `json:"authentication_context_settings,omitempty" yaml:"authentication_context_settings,omitempty"`

	// Authorization code time to live
	//
	// After an authorization code reaches its time to live, it expires and it cannot be used to
	// authorize the request to the `/token` endpoint.
	// Example: 10m0s
	// Format: duration
	AuthorizationCodeTTL strfmt.Duration `json:"authorization_code_ttl,omitempty" yaml:"authorization_code_ttl,omitempty"`

	// backchannel token delivery modes supported
	BackchannelTokenDeliveryModesSupported []string `json:"backchannel_token_delivery_modes_supported" yaml:"backchannel_token_delivery_modes_supported"`

	// backchannel user code parameter supported
	BackchannelUserCodeParameterSupported bool `json:"backchannel_user_code_parameter_supported,omitempty" yaml:"backchannel_user_code_parameter_supported,omitempty"`

	// cdr
	Cdr *CDRConfiguration `json:"cdr,omitempty" yaml:"cdr,omitempty"`

	// Your server's label color in a HEX format.
	// Example: #007FFF
	Color string `json:"color,omitempty" yaml:"color,omitempty"`

	// Namespace used when creating Open Banking Brasil consent IDs
	//
	// Consent IDs will have the form of urn:<consent_id_namespace>:<uid> when this is set.
	// If this is empty, the tenant id is used by default
	ConsentIDNamespace string `json:"consent_id_namespace,omitempty" yaml:"consent_id_namespace,omitempty"`

	// Cookie max age
	//
	// Defines how long a cookie can live until it expires.
	// Example: 1h10m30s
	// Format: duration
	CookieMaxAge strfmt.Duration `json:"cookie_max_age,omitempty" yaml:"cookie_max_age,omitempty"`

	// Defines a custom issuer URL that can be used as the value of the `iss` claim in an access
	// token.
	//
	// If not provided, it is built dynamically based on the server's URL.
	// Example: http://example.com/default/default
	CustomIssuerURL string `json:"custom_issuer_url,omitempty" yaml:"custom_issuer_url,omitempty"`

	// Display description of the workspace
	// Example: Server description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// device authorization
	DeviceAuthorization *DeviceAuthorizationConfiguration `json:"device_authorization,omitempty" yaml:"device_authorization,omitempty"`

	// dynamic client registration
	DynamicClientRegistration *DynamicClientRegistrationSettings `json:"dynamic_client_registration,omitempty" yaml:"dynamic_client_registration,omitempty"`

	// You can use this property to define a separator that is used for dynamic scopes.
	//
	// For example, the default separator is `.`, so the scope could look like the following:
	// `users.*`.
	//
	// For Open Banking Brazil compliant servers, the `:` separator should be used.
	DynamicScopeSeparator string `json:"dynamic_scope_separator,omitempty" yaml:"dynamic_scope_separator,omitempty"`

	// Deprecated: Use IDPDiscovery instead
	//
	// If enabled, IDP discovery automatically redirects the user to their own IDP and does not
	// display IDPs of other users while the users accesses the server/application.
	// Example: false
	EnableIdpDiscovery bool `json:"enable_idp_discovery,omitempty" yaml:"enable_idp_discovery,omitempty"`

	// Deprecated
	//
	// If enabled, it is possible to manually register clients withouth the use of software
	// statements.
	//
	// This flag is enabled, when the `enable_trust_anchor` flag is set to `false`. You can disable
	// it using API, but it cannot be manually enabled.
	EnableLegacyClientsWithNoSoftwareStatement bool `` /* 131-byte string literal not displayed */

	// If enabled, the server is visible on the Quick Access tab on the login page.
	EnableQuickAccess bool `json:"enable_quick_access,omitempty" yaml:"enable_quick_access,omitempty"`

	// If enabled, it makes it obligatory to provide a software statement signed by a trusted certificate authority
	//
	// when registering a client application with the use of the Dynamic Client Registration (DCR).
	//
	// In public key infrastructure (PKI), trust anchors are certification authorities. They are
	// represented by a certificate that is used to verify the signature of a certificate issued by
	// a particular trust anchor.
	EnableTrustAnchor bool `json:"enable_trust_anchor,omitempty" yaml:"enable_trust_anchor,omitempty"`

	// When enabled, the authorization server will enforce encrypted id tokens it issues
	EnforceIDTokenEncryption bool `json:"enforce_id_token_encryption,omitempty" yaml:"enforce_id_token_encryption,omitempty"`

	// Define whether you want to enforce using the Proof Key of Code Exchange (PKCE) for both
	// private and public clients.
	//
	// PKCE is an OAuth security extension that prevents malicious applications or codes that
	// intercepted authorization code from exchanging it for an access token.
	// Example: false
	EnforcePkce bool `json:"enforce_pkce,omitempty" yaml:"enforce_pkce,omitempty"`

	// Define whether you want to enforce using the Proof Key of Code Exchange (PKCE) for
	// public clients.
	//
	// Public clients, like mobile applications or JavaScript-based applications, by their design,
	// cannot store client secrets securely. For such clients, even encrypting the client secret
	// inside the application’s code is not a reliable way of protecting secrets as the application
	// can be decompiled and the client secret can be extracted while it is decrypted in the memory
	// of the application.
	//
	// For those reasons, ACP supports the use of PKCE as an addition to the authorization code
	// grant flow to provide a secure alternative to the implicit grant flow.
	// Example: false
	EnforcePkceForPublicClients bool `json:"enforce_pkce_for_public_clients,omitempty" yaml:"enforce_pkce_for_public_clients,omitempty"`

	// fdx
	Fdx *FDXConfiguration `json:"fdx,omitempty" yaml:"fdx,omitempty"`

	// An array that defines which of the OAuth 2.0 grant types are enabled for the authorization server.
	// Example: ["authorization_code","implicit","refresh_token","client_credentials"]
	GrantTypes []string `json:"grant_types" yaml:"grant_types"`

	// Unique identifier of an authorization server (workspace)
	//
	// If not provided, a random ID is generated.
	// Example: default
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID token time to live
	//
	// After an ID token reaches its time to live, it expires and it cannot be used to provide
	// user profile information to a client application.
	// Example: 1h10m30s
	// Format: duration
	IDTokenTTL strfmt.Duration `json:"id_token_ttl,omitempty" yaml:"id_token_ttl,omitempty"`

	// identity assurance
	IdentityAssurance *IdentityAssuranceConfiguration `json:"identity_assurance,omitempty" yaml:"identity_assurance,omitempty"`

	// idp discovery
	IdpDiscovery *IDPDiscovery `json:"idp_discovery,omitempty" yaml:"idp_discovery,omitempty"`

	// Issuer ID that will be used to set `iss` claim on signed messages
	//
	// If issuer_id is not set then default issuer_url will be used
	// Example: 5647fe90-f6bc-11eb-9a03-0242ac130003
	IssuerID string `json:"issuer_id,omitempty" yaml:"issuer_id,omitempty"`

	// Determines which type of asymmetric algorithms (RSA or ECDSA) is used to generate keys for signing access and
	// ID tokens.
	//
	// It is used only as an input parameter for the Create Authorization Server API.
	// Example: rsa
	// Enum: [rsa ecdsa ps]
	KeyType string `json:"key_type,omitempty" yaml:"key_type,omitempty"`

	// legal entity
	LegalEntity *LegalEntity `json:"legal_entity,omitempty" yaml:"legal_entity,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// metadata
	Metadata *ServerMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// Display name of the workspace
	//
	// If not provided, a random ID is generated.
	// Example: default
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// obbr
	Obbr *OBBRConfiguration `json:"obbr,omitempty" yaml:"obbr,omitempty"`

	// organization
	Organization *OrganizationConfiguration `json:"organization,omitempty" yaml:"organization,omitempty"`

	// Optional ID of a parent server
	ParentID string `json:"parent_id,omitempty" yaml:"parent_id,omitempty"`

	// The profile of a server
	//
	// ACP is delivered with preconfigured workspace templates that enable quick and easy setup for
	// specific configuration patterns. For example, you can instantly create an Open Banking
	// compliant workspace that has all of the required mechanisms and settings already in place.
	// Example: default
	// Enum: [default demo workforce consumer partners third_party fapi_advanced fapi_rw fapi_ro openbanking_uk_fapi_advanced openbanking_uk openbanking_br cdr_australia cdr_australia_fapi_rw fdx openbanking_ksa fapi_20_security fapi_20_message_signing connect_id]
	Profile string `json:"profile,omitempty" yaml:"profile,omitempty"`

	// Custom pushed authentication request TTL
	// If not provided, TTL is set to 60 seconds.
	// Format: duration
	PushedAuthorizationRequestTTL strfmt.Duration `json:"pushed_authorization_request_ttl,omitempty" yaml:"pushed_authorization_request_ttl,omitempty"`

	// Refresh token time to live
	//
	// After a refresh token reaches its time to live, it expires and it cannot be used to obtain
	// new access tokens for a client application.
	// Example: 720h0m0s
	// Format: duration
	RefreshTokenTTL strfmt.Duration `json:"refresh_token_ttl,omitempty" yaml:"refresh_token_ttl,omitempty"`

	// Boolean parameter indicating whether the authorization server accepts authorization request data only via PAR.
	RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"`

	// response types
	ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"`

	// saml
	Saml *SAMLConfiguration `json:"saml,omitempty" yaml:"saml,omitempty"`

	// sso
	Sso *SSOConfiguration `json:"sso,omitempty" yaml:"sso,omitempty"`

	// styling
	Styling *Styling `json:"styling,omitempty" yaml:"styling,omitempty"`

	// Define the format of a subject
	// When set to hash sub value is a one way hash of idp id and idp sub
	// Enum: [hash legacy]
	SubjectFormat string `json:"subject_format,omitempty" yaml:"subject_format,omitempty"`

	// An array that defines supported subject identifier types.
	//
	// Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer,
	// and are intended to be consumed by client applications. There are two types
	// of subject identifiers: `public` and `pairwise`.
	//
	// `public` identifiers provide the same `sub` claim value to all client applications.
	// `pairwise` identifiers provide different `sub` claim values to each client application. With
	// this approach, it makes it impossible for client applications to correlate the end-user's
	// activity without their permission.
	// Example: ["public","pairwise"]
	SubjectIdentifierTypes []string `json:"subject_identifier_types" yaml:"subject_identifier_types"`

	// If true this workspace can be used as a template when creating a new ones.
	Template bool `json:"template,omitempty" yaml:"template,omitempty"`

	// ID of a tenant
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// An array that lists all of the supported token endpoint authentication methods for the
	// authorization server.
	TokenEndpointAuthMethods []string `json:"token_endpoint_auth_methods" yaml:"token_endpoint_auth_methods"`

	// Token endpoint auth signing supported alg values
	//
	// Supported algorithms: HS256, RS256, ES256, PS256
	//
	// At least one algorithm must be set.
	//
	// The default values depends on the server security profile.
	TokenEndpointAuthSigningAlgValues []string `json:"token_endpoint_auth_signing_alg_values" yaml:"token_endpoint_auth_signing_alg_values"`

	// Deprecated: Use TokenEndpointAuthMethods instead
	TokenEndpointAuthnMethods []string `json:"token_endpoint_authn_methods" yaml:"token_endpoint_authn_methods"`

	// trust anchor configuration
	TrustAnchorConfiguration *TrustAnchorConfiguration `json:"trust_anchor_configuration,omitempty" yaml:"trust_anchor_configuration,omitempty"`

	// Server type
	//
	// It is an internal property used to recognize if the server is created for an admin portal,
	// a developer portal, or if it is a system or a regular workspace.
	// Example: regular
	// Enum: [admin developer system regular organization]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// server version to track internal changes
	// version that is currently the latest: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`
}

ServerAuditPayload server audit payload

swagger:model ServerAuditPayload

func (*ServerAuditPayload) ContextValidate ¶

func (m *ServerAuditPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this server audit payload based on the context it is used

func (*ServerAuditPayload) MarshalBinary ¶

func (m *ServerAuditPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServerAuditPayload) UnmarshalBinary ¶

func (m *ServerAuditPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServerAuditPayload) Validate ¶

func (m *ServerAuditPayload) Validate(formats strfmt.Registry) error

Validate validates this server audit payload

type ServerBindingResponse ¶

type ServerBindingResponse struct {

	// Your server's label color in a HEX format.
	// Example: #007FFF
	Color string `json:"color,omitempty" yaml:"color,omitempty"`

	// dependent server id
	// Example: default
	Dependent string `json:"dependent,omitempty" yaml:"dependent,omitempty"`

	// dependent server
	DependentServer *ServerInfo `json:"dependent_server,omitempty" yaml:"dependent_server,omitempty"`

	// Display description of the workspace
	// Example: Server description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// Display name of the workspace
	//
	// If not provided, a random ID is generated.
	// Example: default
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// The profile of a server
	//
	// ACP is delivered with preconfigured workspace templates that enable quick and easy setup for
	// specific configuration patterns. For example, you can instantly create an Open Banking
	// compliant workspace that has all of the required mechanisms and settings already in place.
	// Example: default
	// Enum: [default demo workforce consumer partners third_party fapi_advanced fapi_rw fapi_ro openbanking_uk_fapi_advanced openbanking_uk openbanking_br cdr_australia cdr_australia_fapi_rw fdx openbanking_ksa fapi_20_security fapi_20_message_signing connect_id]
	Profile string `json:"profile,omitempty" yaml:"profile,omitempty"`

	// authorization server id
	// Example: developer
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// tenant id
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// Server type
	//
	// It is an internal property used to recognize if the server is created for an admin portal,
	// a developer portal, or if it is a system or a regular workspace.
	// Example: regular
	// Enum: [admin developer system regular organization]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

ServerBindingResponse server binding response

swagger:model ServerBindingResponse

func (*ServerBindingResponse) ContextValidate ¶

func (m *ServerBindingResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this server binding response based on the context it is used

func (*ServerBindingResponse) MarshalBinary ¶

func (m *ServerBindingResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServerBindingResponse) UnmarshalBinary ¶

func (m *ServerBindingResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServerBindingResponse) Validate ¶

func (m *ServerBindingResponse) Validate(formats strfmt.Registry) error

Validate validates this server binding response

type ServerConsent ¶

type ServerConsent struct {

	// client id
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// custom
	Custom *CustomServerConsent `json:"custom,omitempty" yaml:"custom,omitempty"`

	// oidc
	Oidc OIDCServerConsent `json:"oidc,omitempty" yaml:"oidc,omitempty"`

	// openbanking
	Openbanking *OpenbankingServerConsent `json:"openbanking,omitempty" yaml:"openbanking,omitempty"`

	// server id
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

ServerConsent server consent

swagger:model ServerConsent

func (*ServerConsent) ContextValidate ¶

func (m *ServerConsent) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this server consent based on the context it is used

func (*ServerConsent) MarshalBinary ¶

func (m *ServerConsent) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServerConsent) UnmarshalBinary ¶

func (m *ServerConsent) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServerConsent) Validate ¶

func (m *ServerConsent) Validate(formats strfmt.Registry) error

Validate validates this server consent

type ServerConsentResponse ¶

type ServerConsentResponse struct {

	// client
	Client *ClientAdminResponse `json:"client,omitempty" yaml:"client,omitempty"`

	// client id
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// custom
	Custom *CustomServerConsent `json:"custom,omitempty" yaml:"custom,omitempty"`

	// oidc
	Oidc OIDCServerConsent `json:"oidc,omitempty" yaml:"oidc,omitempty"`

	// openbanking
	Openbanking *OpenbankingServerConsent `json:"openbanking,omitempty" yaml:"openbanking,omitempty"`

	// server id
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

ServerConsentResponse server consent response

swagger:model ServerConsentResponse

func (*ServerConsentResponse) ContextValidate ¶

func (m *ServerConsentResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this server consent response based on the context it is used

func (*ServerConsentResponse) MarshalBinary ¶

func (m *ServerConsentResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServerConsentResponse) UnmarshalBinary ¶

func (m *ServerConsentResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServerConsentResponse) Validate ¶

func (m *ServerConsentResponse) Validate(formats strfmt.Registry) error

Validate validates this server consent response

type ServerInfo ¶

type ServerInfo struct {

	// Your server's label color in a HEX format.
	// Example: #007FFF
	Color string `json:"color,omitempty" yaml:"color,omitempty"`

	// Display description of the workspace
	// Example: Server description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// Display name of the workspace
	//
	// If not provided, a random ID is generated.
	// Example: default
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// The profile of a server
	//
	// ACP is delivered with preconfigured workspace templates that enable quick and easy setup for
	// specific configuration patterns. For example, you can instantly create an Open Banking
	// compliant workspace that has all of the required mechanisms and settings already in place.
	// Example: default
	// Enum: [default demo workforce consumer partners third_party fapi_advanced fapi_rw fapi_ro openbanking_uk_fapi_advanced openbanking_uk openbanking_br cdr_australia cdr_australia_fapi_rw fdx openbanking_ksa fapi_20_security fapi_20_message_signing connect_id]
	Profile string `json:"profile,omitempty" yaml:"profile,omitempty"`

	// Server type
	//
	// It is an internal property used to recognize if the server is created for an admin portal,
	// a developer portal, or if it is a system or a regular workspace.
	// Example: regular
	// Enum: [admin developer system regular organization]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

ServerInfo server info

swagger:model ServerInfo

func (*ServerInfo) ContextValidate ¶

func (m *ServerInfo) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this server info based on context it is used

func (*ServerInfo) MarshalBinary ¶

func (m *ServerInfo) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServerInfo) UnmarshalBinary ¶

func (m *ServerInfo) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServerInfo) Validate ¶

func (m *ServerInfo) Validate(formats strfmt.Registry) error

Validate validates this server info

type ServerJWK ¶

type ServerJWK struct {

	// The "alg" (algorithm) parameter identifies the algorithm intended for
	// use with the key.  The values used should either be registered in the
	// IANA "JSON Web Signature and Encryption Algorithms" registry
	// established by [JWA] or be a value that contains a Collision-
	// Resistant Name.
	// Example: RS256
	Alg string `json:"alg,omitempty" yaml:"alg,omitempty"`

	// Time when key was generated
	// Format: date-time
	CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"`

	// crv
	// Example: P-256
	Crv string `json:"crv,omitempty" yaml:"crv,omitempty"`

	// d
	// Example: T_N8I-6He3M8a7X1vWt6TGIx4xB_GP3Mb4SsZSA4v-orvJzzRiQhLlRR81naWYxfQAYt5isDI6_C2L9bdWo4FFPjGQFvNoRX-_sBJyBI_rl-TBgsZYoUlAj3J92WmY2inbA-PwyJfsaIIDceYBC-eX-xiCu6qMqkZi3MwQAFL6bMdPEM0z4JBcwFT3VdiWAIRUuACWQwrXMq672x7fMuaIaHi7XDGgt1ith23CLfaREmJku9PQcchbt_uEY-hqrFY6ntTtS4paWWQj86xLL94S-Tf6v6xkL918PfLSOTq6XCzxvlFwzBJqApnAhbwqLjpPhgUG04EDRrqrSBc5Y1BLevn6Ip5h1AhessBp3wLkQgz_roeckt-ybvzKTjESMuagnpqLvOT7Y9veIug2MwPJZI2VjczRc1vzMs25XrFQ8DpUy-bNdp89TmvAXwctUMiJdgHloJw23Cv03gIUAkDnsTqZmkpbIf-crpgNKFmQP_EDKoe8p_PXZZgfbRri3NoEVGP7Mk6yEu8LjJhClhZaBNjuWw2-KlBfOA3g79mhfBnkInee5KO9mGR50qPk1V-MorUYNTFMZIm0kFE6eYVWFBwJHLKYhHU34DoiK1VP-svZpC2uAMFNA_UJEwM9CQ2b8qe4-5e9aywMvwcuArRkAB5mBIfOaOJao3mfukKAE
	D string `json:"d,omitempty" yaml:"d,omitempty"`

	// dp
	// Example: G4sPXkc6Ya9y8oJW9_ILj4xuppu0lzi_H7VTkS8xj5SdX3coE0oimYwxIi2emTAue0UOa5dpgFGyBJ4c8tQ2VF402XRugKDTP8akYhFo5tAA77Qe_NmtuYZc3C3m3I24G2GvR5sSDxUyAN2zq8Lfn9EUms6rY3Ob8YeiKkTiBj0
	Dp string `json:"dp,omitempty" yaml:"dp,omitempty"`

	// dq
	// Example: s9lAH9fggBsoFR8Oac2R_E2gw282rT2kGOAhvIllETE1efrA6huUUvMfBcMpn8lqeW6vzznYY5SSQF7pMdC_agI3nG8Ibp1BUb0JUiraRNqUfLhcQb_d9GF4Dh7e74WbRsobRonujTYN1xCaP6TO61jvWrX-L18txXw494Q_cgk
	Dq string `json:"dq,omitempty" yaml:"dq,omitempty"`

	// e
	// Example: AQAB
	E string `json:"e,omitempty" yaml:"e,omitempty"`

	// k
	// Example: GawgguFyGrWKav7AX4VKUg
	K string `json:"k,omitempty" yaml:"k,omitempty"`

	// The "kid" (key ID) parameter is used to match a specific key.  This
	// is used, for instance, to choose among a set of keys within a JWK Set
	// during key rollover.  The structure of the "kid" value is
	// unspecified.  When "kid" values are used within a JWK Set, different
	// keys within the JWK Set SHOULD use distinct "kid" values.  (One
	// example in which different keys might use the same "kid" value is if
	// they have different "kty" (key type) values but are considered to be
	// equivalent alternatives by the application using them.)  The "kid"
	// value is a case-sensitive string.
	// Example: 1603dfe0af8f4596
	Kid string `json:"kid,omitempty" yaml:"kid,omitempty"`

	// The "kty" (key type) parameter identifies the cryptographic algorithm
	// family used with the key, such as "RSA" or "EC". "kty" values should
	// either be registered in the IANA "JSON Web Key Types" registry
	// established by [JWA] or be a value that contains a Collision-
	// Resistant Name.  The "kty" value is a case-sensitive string.
	// Example: RSA
	// Required: true
	Kty string `json:"kty" yaml:"kty"`

	// n
	// Example: vTqrxUyQPl_20aqf5kXHwDZrel-KovIp8s7ewJod2EXHl8tWlRB3_Rem34KwBfqlKQGp1nqah-51H4Jzruqe0cFP58hPEIt6WqrvnmJCXxnNuIB53iX_uUUXXHDHBeaPCSRoNJzNysjoJ30TIUsKBiirhBa7f235PXbKiHducLevV6PcKxJ5cY8zO286qJLBWSPm-OIevwqsIsSIH44Qtm9sioFikhkbLwoqwWORGAY0nl6XvVOlhADdLjBSqSAeT1FPuCDCnXwzCDR8N9IFB_IjdStFkC-rVt2K5BYfPd0c3yFp_vHR15eRd0zJ8XQ7woBC8Vnsac6Et1pKS59pX6256DPWu8UDdEOolKAPgcd_g2NpA76cAaF_jcT80j9KrEzw8Tv0nJBGesuCjPNjGs_KzdkWTUXt23Hn9QJsdc1MZuaW0iqXBepHYfYoqNelzVte117t4BwVp0kUM6we0IqyXClaZgOI8S-WDBw2_Ovdm8e5NmhYAblEVoygcX8Y46oH6bKiaCQfKCFDMcRgChme7AoE1yZZYsPbaG_3IjPrC4LBMHQw8rM9dWjJ8ImjicvZ1pAm0dx-KHCP3y5PVKrxBDf1zSOsBRkOSjB8TPODnJMz6-jd5hTtZxpZPwPoIdCanTZ3ZD6uRBpTmDwtpRGm63UQs1m5FWPwb0T2IF0
	N string `json:"n,omitempty" yaml:"n,omitempty"`

	// p
	// Example: 6NbkXwDWUhi-eR55Cgbf27FkQDDWIamOaDr0rj1q0f1fFEz1W5A_09YvG09Fiv1AO2-D8Rl8gS1Vkz2i0zCSqnyy8A025XOcRviOMK7nIxE4OH_PEsko8dtIrb3TmE2hUXvCkmzw9EsTF1LQBOGC6iusLTXepIC1x9ukCKFZQvdgtEObQ5kzd9Nhq-cdqmSeMVLoxPLd1blviVT9Vm8-y12CtYpeJHOaIDtVPLlBhJiBoPKWg3vxSm4XxIliNOefqegIlsmTIa3MpS6WWlCK3yHhat0Q-rRxDxdyiVdG_wzJvp0Iw_2wms7pe-PgNPYvUWH9JphWP5K38YqEBiJFXQ
	P string `json:"p,omitempty" yaml:"p,omitempty"`

	// Time when key was set as current key in use
	// Format: date-time
	PromotedAt strfmt.DateTime `json:"promoted_at,omitempty" yaml:"promoted_at,omitempty"`

	// q
	// Example: 0A1FmpOWR91_RAWpqreWSavNaZb9nXeKiBo0DQGBz32DbqKqQ8S4aBJmbRhJcctjCLjain-ivut477tAUMmzJwVJDDq2MZFwC9Q-4VYZmFU4HJityQuSzHYe64RjN-E_NQ02TWhG3QGW6roq6c57c99rrUsETwJJiwS8M5p15Miuz53DaOjv-uqqFAFfywN5WkxHbraBcjHtMiQuyQbQqkCFh-oanHkwYNeytsNhTu2mQmwR5DR2roZ2nPiFjC6nsdk-A7E3S3wMzYYFw7jvbWWoYWo9vB40_MY2Y0FYQSqcDzcBIcq_0tnnasf3VW4Fdx6m80RzOb2Fsnln7vKXAQ
	Q string `json:"q,omitempty" yaml:"q,omitempty"`

	// qi
	// Example: GyM_p6JrXySiz1toFgKbWV-JdI3jQ4ypu9rbMWx3rQJBfmt0FoYzgUIZEVFEcOqwemRN81zoDAaa-Bk0KWNGDjJHZDdDmFhW3AN7lI-puxk_mHZGJ11rxyR8O55XLSe3SPmRfKwZI6yU24ZxvQKFYItdldUKGzO6Ia6zTKhAVRU
	Qi string `json:"qi,omitempty" yaml:"qi,omitempty"`

	// Time when key was revoked
	// Format: date-time
	RevokedAt strfmt.DateTime `json:"revoked_at,omitempty" yaml:"revoked_at,omitempty"`

	// Time when key was rotated
	// Format: date-time
	RotatedAt strfmt.DateTime `json:"rotated_at,omitempty" yaml:"rotated_at,omitempty"`

	// Use ("public key use") identifies the intended use of
	// the public key. The "use" parameter is employed to indicate whether
	// a public key is used for encrypting data or verifying the signature
	// on data. Values are commonly "sig" (signature) or "enc" (encryption).
	// Example: sig
	Use string `json:"use,omitempty" yaml:"use,omitempty"`

	// x
	// Example: f83OJ3D2xF1Bg8vub9tLe1gHMzV76e8Tus9uPHvRVEU
	X string `json:"x,omitempty" yaml:"x,omitempty"`

	// The "x5c" (X.509 certificate chain) parameter contains a chain of one
	// or more PKIX certificates [RFC5280].  The certificate chain is
	// represented as a JSON array of certificate value strings.  Each
	// string in the array is a base64-encoded (Section 4 of [RFC4648] --
	// not base64url-encoded) DER [ITU.X690.1994] PKIX certificate value.
	// The PKIX certificate containing the key value MUST be the first
	// certificate.
	X5c []string `json:"x5c" yaml:"x5c"`

	// x5t
	// Example: GawgguFyGrWKav7AX4VKUg
	X5t string `json:"x5t,omitempty" yaml:"x5t,omitempty"`

	// x5t s256
	// Example: GawgguFyGrWKav7AX4VKUg
	X5tS256 string `json:"x5t#S256,omitempty" yaml:"x5t#S256,omitempty"`

	// y
	// Example: x_FEzRu9m36HLN_tue659LNpXW6pCyStikYjKIWI5a0
	Y string `json:"y,omitempty" yaml:"y,omitempty"`
}

ServerJWK server j w k

swagger:model ServerJWK

func (*ServerJWK) ContextValidate ¶

func (m *ServerJWK) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this server j w k based on context it is used

func (*ServerJWK) MarshalBinary ¶

func (m *ServerJWK) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServerJWK) UnmarshalBinary ¶

func (m *ServerJWK) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServerJWK) Validate ¶

func (m *ServerJWK) Validate(formats strfmt.Registry) error

Validate validates this server j w k

type ServerJWKs ¶

type ServerJWKs struct {

	// keys
	// Example: []
	Keys []*ServerJWK `json:"keys" yaml:"keys"`

	// next encryption key
	NextEncryptionKey *ServerJWK `json:"next_encryption_key,omitempty" yaml:"next_encryption_key,omitempty"`

	// next signing key
	NextSigningKey *ServerJWK `json:"next_signing_key,omitempty" yaml:"next_signing_key,omitempty"`

	// An array of revoked encryption keys
	//
	// Revoked encryption keys cannot be used to encrypt payloads between servers and client applications
	RevokedEncryptionKeys []*ServerJWK `json:"revoked_encryption_keys" yaml:"revoked_encryption_keys"`

	// The maximum number of revoked keys that ACP stores.
	RevokedKeysLimit int64 `json:"revoked_keys_limit,omitempty" yaml:"revoked_keys_limit,omitempty"`

	// An array of revoked sigining keys
	//
	// Revoked signing keys cannot be used to sign any tokens.
	// Any attempt to authenticate using a token signed with a revoked signing key results
	// in failed authentication.
	RevokedSigningKeys []*ServerJWK `json:"revoked_signing_keys" yaml:"revoked_signing_keys"`

	// The maximum number of rotated keys that ACP stores.
	RotatedKeysLimit int64 `json:"rotated_keys_limit,omitempty" yaml:"rotated_keys_limit,omitempty"`
}

ServerJWKs server j w ks

swagger:model ServerJWKs

func (*ServerJWKs) ContextValidate ¶

func (m *ServerJWKs) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this server j w ks based on the context it is used

func (*ServerJWKs) MarshalBinary ¶

func (m *ServerJWKs) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServerJWKs) UnmarshalBinary ¶

func (m *ServerJWKs) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServerJWKs) Validate ¶

func (m *ServerJWKs) Validate(formats strfmt.Registry) error

Validate validates this server j w ks

type ServerMetadata ¶

type ServerMetadata struct {

	// metadata payload
	Payload map[string]interface{} `json:"payload,omitempty" yaml:"payload,omitempty"`

	// schema
	Schema *SupportedJSONSchema `json:"schema,omitempty" yaml:"schema,omitempty"`
}

ServerMetadata server metadata

swagger:model ServerMetadata

func (*ServerMetadata) ContextValidate ¶

func (m *ServerMetadata) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this server metadata based on the context it is used

func (*ServerMetadata) MarshalBinary ¶

func (m *ServerMetadata) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServerMetadata) UnmarshalBinary ¶

func (m *ServerMetadata) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServerMetadata) Validate ¶

func (m *ServerMetadata) Validate(formats strfmt.Registry) error

Validate validates this server metadata

type ServerResponse ¶

type ServerResponse struct {

	// Access token strategy
	//
	// You can choose to go either with `JWT` or `opaque` tokens.
	//
	// The content of JSON Web Tokens is readable and it is possible to be decoded by anyone that
	// has a secret or a public key in their possession.
	//
	// Opaque tokens are in a proprietary form that contains an identifier to information stored on
	// the athorization server. To validate an opaque token, the recipient must call the server that
	// issued the token.
	// Example: jwt
	// Enum: [jwt opaque]
	AccessTokenStrategy string `json:"access_token_strategy,omitempty" yaml:"access_token_strategy,omitempty"`

	// Access token time to live
	//
	// After an access token reaches its time to live, it expires and it cannot be used to
	// authenticate the client application.
	// Example: 1h10m30s
	// Format: duration
	AccessTokenTTL strfmt.Duration `json:"access_token_ttl,omitempty" yaml:"access_token_ttl,omitempty"`

	// advanced
	Advanced *AdvancedConfiguration `json:"advanced,omitempty" yaml:"advanced,omitempty"`

	// authentication context settings
	AuthenticationContextSettings *AuthenticationContextSettings `json:"authentication_context_settings,omitempty" yaml:"authentication_context_settings,omitempty"`

	// Authorization code time to live
	//
	// After an authorization code reaches its time to live, it expires and it cannot be used to
	// authorize the request to the `/token` endpoint.
	// Example: 10m0s
	// Format: duration
	AuthorizationCodeTTL strfmt.Duration `json:"authorization_code_ttl,omitempty" yaml:"authorization_code_ttl,omitempty"`

	// backchannel token delivery modes supported
	BackchannelTokenDeliveryModesSupported []string `json:"backchannel_token_delivery_modes_supported" yaml:"backchannel_token_delivery_modes_supported"`

	// backchannel user code parameter supported
	BackchannelUserCodeParameterSupported bool `json:"backchannel_user_code_parameter_supported,omitempty" yaml:"backchannel_user_code_parameter_supported,omitempty"`

	// cdr
	Cdr *CDRConfiguration `json:"cdr,omitempty" yaml:"cdr,omitempty"`

	// Your server's label color in a HEX format.
	// Example: #007FFF
	Color string `json:"color,omitempty" yaml:"color,omitempty"`

	// Namespace used when creating Open Banking Brasil consent IDs
	//
	// Consent IDs will have the form of urn:<consent_id_namespace>:<uid> when this is set.
	// If this is empty, the tenant id is used by default
	ConsentIDNamespace string `json:"consent_id_namespace,omitempty" yaml:"consent_id_namespace,omitempty"`

	// Cookie max age
	//
	// Defines how long a cookie can live until it expires.
	// Example: 1h10m30s
	// Format: duration
	CookieMaxAge strfmt.Duration `json:"cookie_max_age,omitempty" yaml:"cookie_max_age,omitempty"`

	// Defines a custom issuer URL that can be used as the value of the `iss` claim in an access
	// token.
	//
	// If not provided, it is built dynamically based on the server's URL.
	// Example: http://example.com/default/default
	CustomIssuerURL string `json:"custom_issuer_url,omitempty" yaml:"custom_issuer_url,omitempty"`

	// Display description of the workspace
	// Example: Server description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// device authorization
	DeviceAuthorization *DeviceAuthorizationConfiguration `json:"device_authorization,omitempty" yaml:"device_authorization,omitempty"`

	// dynamic client registration
	DynamicClientRegistration *DynamicClientRegistrationSettings `json:"dynamic_client_registration,omitempty" yaml:"dynamic_client_registration,omitempty"`

	// You can use this property to define a separator that is used for dynamic scopes.
	//
	// For example, the default separator is `.`, so the scope could look like the following:
	// `users.*`.
	//
	// For Open Banking Brazil compliant servers, the `:` separator should be used.
	DynamicScopeSeparator string `json:"dynamic_scope_separator,omitempty" yaml:"dynamic_scope_separator,omitempty"`

	// Deprecated: Use IDPDiscovery instead
	//
	// If enabled, IDP discovery automatically redirects the user to their own IDP and does not
	// display IDPs of other users while the users accesses the server/application.
	// Example: false
	EnableIdpDiscovery bool `json:"enable_idp_discovery,omitempty" yaml:"enable_idp_discovery,omitempty"`

	// Deprecated
	//
	// If enabled, it is possible to manually register clients withouth the use of software
	// statements.
	//
	// This flag is enabled, when the `enable_trust_anchor` flag is set to `false`. You can disable
	// it using API, but it cannot be manually enabled.
	EnableLegacyClientsWithNoSoftwareStatement bool `` /* 131-byte string literal not displayed */

	// If enabled, the server is visible on the Quick Access tab on the login page.
	EnableQuickAccess bool `json:"enable_quick_access,omitempty" yaml:"enable_quick_access,omitempty"`

	// If enabled, it makes it obligatory to provide a software statement signed by a trusted certificate authority
	//
	// when registering a client application with the use of the Dynamic Client Registration (DCR).
	//
	// In public key infrastructure (PKI), trust anchors are certification authorities. They are
	// represented by a certificate that is used to verify the signature of a certificate issued by
	// a particular trust anchor.
	EnableTrustAnchor bool `json:"enable_trust_anchor,omitempty" yaml:"enable_trust_anchor,omitempty"`

	// When enabled, the authorization server will enforce encrypted id tokens it issues
	EnforceIDTokenEncryption bool `json:"enforce_id_token_encryption,omitempty" yaml:"enforce_id_token_encryption,omitempty"`

	// Define whether you want to enforce using the Proof Key of Code Exchange (PKCE) for both
	// private and public clients.
	//
	// PKCE is an OAuth security extension that prevents malicious applications or codes that
	// intercepted authorization code from exchanging it for an access token.
	// Example: false
	EnforcePkce bool `json:"enforce_pkce,omitempty" yaml:"enforce_pkce,omitempty"`

	// Define whether you want to enforce using the Proof Key of Code Exchange (PKCE) for
	// public clients.
	//
	// Public clients, like mobile applications or JavaScript-based applications, by their design,
	// cannot store client secrets securely. For such clients, even encrypting the client secret
	// inside the application’s code is not a reliable way of protecting secrets as the application
	// can be decompiled and the client secret can be extracted while it is decrypted in the memory
	// of the application.
	//
	// For those reasons, ACP supports the use of PKCE as an addition to the authorization code
	// grant flow to provide a secure alternative to the implicit grant flow.
	// Example: false
	EnforcePkceForPublicClients bool `json:"enforce_pkce_for_public_clients,omitempty" yaml:"enforce_pkce_for_public_clients,omitempty"`

	// fdx
	Fdx *FDXConfiguration `json:"fdx,omitempty" yaml:"fdx,omitempty"`

	// An array that defines which of the OAuth 2.0 grant types are enabled for the authorization server.
	// Example: ["authorization_code","implicit","refresh_token","client_credentials"]
	GrantTypes []string `json:"grant_types" yaml:"grant_types"`

	// Unique identifier of an authorization server (workspace)
	//
	// If not provided, a random ID is generated.
	// Example: default
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID token time to live
	//
	// After an ID token reaches its time to live, it expires and it cannot be used to provide
	// user profile information to a client application.
	// Example: 1h10m30s
	// Format: duration
	IDTokenTTL strfmt.Duration `json:"id_token_ttl,omitempty" yaml:"id_token_ttl,omitempty"`

	// identity assurance
	IdentityAssurance *IdentityAssuranceConfiguration `json:"identity_assurance,omitempty" yaml:"identity_assurance,omitempty"`

	// idp discovery
	IdpDiscovery *IDPDiscovery `json:"idp_discovery,omitempty" yaml:"idp_discovery,omitempty"`

	// Issuer ID that will be used to set `iss` claim on signed messages
	//
	// If issuer_id is not set then default issuer_url will be used
	// Example: 5647fe90-f6bc-11eb-9a03-0242ac130003
	IssuerID string `json:"issuer_id,omitempty" yaml:"issuer_id,omitempty"`

	// issuer url
	IssuerURL string `json:"issuer_url,omitempty" yaml:"issuer_url,omitempty"`

	// jwks
	Jwks *ServerJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"`

	// Determines which type of asymmetric algorithms (RSA or ECDSA) is used to generate keys for signing access and
	// ID tokens.
	//
	// It is used only as an input parameter for the Create Authorization Server API.
	// Example: rsa
	// Enum: [rsa ecdsa ps]
	KeyType string `json:"key_type,omitempty" yaml:"key_type,omitempty"`

	// legal entity
	LegalEntity *LegalEntity `json:"legal_entity,omitempty" yaml:"legal_entity,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// metadata
	Metadata *ServerMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// mtls issuer url
	MtlsIssuerURL string `json:"mtls_issuer_url,omitempty" yaml:"mtls_issuer_url,omitempty"`

	// Display name of the workspace
	//
	// If not provided, a random ID is generated.
	// Example: default
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// obbr
	Obbr *OBBRConfiguration `json:"obbr,omitempty" yaml:"obbr,omitempty"`

	// organization
	Organization *OrganizationConfiguration `json:"organization,omitempty" yaml:"organization,omitempty"`

	// Optional ID of a parent server
	ParentID string `json:"parent_id,omitempty" yaml:"parent_id,omitempty"`

	// The profile of a server
	//
	// ACP is delivered with preconfigured workspace templates that enable quick and easy setup for
	// specific configuration patterns. For example, you can instantly create an Open Banking
	// compliant workspace that has all of the required mechanisms and settings already in place.
	// Example: default
	// Enum: [default demo workforce consumer partners third_party fapi_advanced fapi_rw fapi_ro openbanking_uk_fapi_advanced openbanking_uk openbanking_br cdr_australia cdr_australia_fapi_rw fdx openbanking_ksa fapi_20_security fapi_20_message_signing connect_id]
	Profile string `json:"profile,omitempty" yaml:"profile,omitempty"`

	// Custom pushed authentication request TTL
	// If not provided, TTL is set to 60 seconds.
	// Format: duration
	PushedAuthorizationRequestTTL strfmt.Duration `json:"pushed_authorization_request_ttl,omitempty" yaml:"pushed_authorization_request_ttl,omitempty"`

	// Refresh token time to live
	//
	// After a refresh token reaches its time to live, it expires and it cannot be used to obtain
	// new access tokens for a client application.
	// Example: 720h0m0s
	// Format: duration
	RefreshTokenTTL strfmt.Duration `json:"refresh_token_ttl,omitempty" yaml:"refresh_token_ttl,omitempty"`

	// Boolean parameter indicating whether the authorization server accepts authorization request data only via PAR.
	RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"`

	// response types
	ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"`

	// You can provide root Certificate Authority (CA) certificates encoded to the Privacy-Enhanced
	// Mail (PEM) file format which are used for the `tls_client_auth` and the
	// `self_signed_tls_client_auth` client authentication methods that use the Mutual
	// Transport Layer Security (mTLS).
	//
	// If not set, the system root CA certifiates are used instead.
	RootCas string `json:"root_cas,omitempty" yaml:"root_cas,omitempty"`

	// An array of rotated secrets that are still used to validate tokens
	// Example: ["jFpwIvuKJP46J71WqszPv1SrzoUr-cSILP9EPdlClB4"]
	RotatedSecrets []string `json:"rotated_secrets" yaml:"rotated_secrets"`

	// saml
	Saml *SAMLConfiguration `json:"saml,omitempty" yaml:"saml,omitempty"`

	// Secret used for hashing
	//
	// It must have at least 32 characters. If not provided, it is generated.
	// Example: hW5WhKX_7w7BLwUQ6mn7Cp70_OoKI_F1y1hLS5U8lIU
	Secret string `json:"secret,omitempty" yaml:"secret,omitempty"`

	// sso
	Sso *SSOConfiguration `json:"sso,omitempty" yaml:"sso,omitempty"`

	// styling
	Styling *Styling `json:"styling,omitempty" yaml:"styling,omitempty"`

	// Define the format of a subject
	// When set to hash sub value is a one way hash of idp id and idp sub
	// Enum: [hash legacy]
	SubjectFormat string `json:"subject_format,omitempty" yaml:"subject_format,omitempty"`

	// Salt used to hash `subject` when the `pairwise` subject type is used.
	//
	// Salt is a random data which is used as an additional input to one-way functions that hashes
	// data, passwords, and, in this case, subjects.
	//
	// It is recommended that your salt value is long for security reasons. Preferably, the salt
	// value should be at least the same length as the output of the hash.
	//
	// If not provided, it is generated.
	SubjectIdentifierAlgorithmSalt string `json:"subject_identifier_algorithm_salt,omitempty" yaml:"subject_identifier_algorithm_salt,omitempty"`

	// An array that defines supported subject identifier types.
	//
	// Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer,
	// and are intended to be consumed by client applications. There are two types
	// of subject identifiers: `public` and `pairwise`.
	//
	// `public` identifiers provide the same `sub` claim value to all client applications.
	// `pairwise` identifiers provide different `sub` claim values to each client application. With
	// this approach, it makes it impossible for client applications to correlate the end-user's
	// activity without their permission.
	// Example: ["public","pairwise"]
	SubjectIdentifierTypes []string `json:"subject_identifier_types" yaml:"subject_identifier_types"`

	// supported application purposes
	// Example: ["single_page","server_web","mobile_desktop","service","legacy"]
	SupportedApplicationPurposes []string `json:"supported_application_purposes" yaml:"supported_application_purposes"`

	// If true this workspace can be used as a template when creating a new ones.
	Template bool `json:"template,omitempty" yaml:"template,omitempty"`

	// ID of a tenant
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// optional theme id
	ThemeID string `json:"theme_id,omitempty" yaml:"theme_id,omitempty"`

	// An array that lists all of the supported token endpoint authentication methods for the
	// authorization server.
	TokenEndpointAuthMethods []string `json:"token_endpoint_auth_methods" yaml:"token_endpoint_auth_methods"`

	// Token endpoint auth signing supported alg values
	//
	// Supported algorithms: HS256, RS256, ES256, PS256
	//
	// At least one algorithm must be set.
	//
	// The default values depends on the server security profile.
	TokenEndpointAuthSigningAlgValues []string `json:"token_endpoint_auth_signing_alg_values" yaml:"token_endpoint_auth_signing_alg_values"`

	// Deprecated: Use TokenEndpointAuthMethods instead
	TokenEndpointAuthnMethods []string `json:"token_endpoint_authn_methods" yaml:"token_endpoint_authn_methods"`

	// trust anchor configuration
	TrustAnchorConfiguration *TrustAnchorConfiguration `json:"trust_anchor_configuration,omitempty" yaml:"trust_anchor_configuration,omitempty"`

	// Server type
	//
	// It is an internal property used to recognize if the server is created for an admin portal,
	// a developer portal, or if it is a system or a regular workspace.
	// Example: regular
	// Enum: [admin developer system regular organization]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// server version to track internal changes
	// version that is currently the latest: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`
}

ServerResponse server response

swagger:model ServerResponse

func (*ServerResponse) ContextValidate ¶

func (m *ServerResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this server response based on the context it is used

func (*ServerResponse) MarshalBinary ¶

func (m *ServerResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServerResponse) UnmarshalBinary ¶

func (m *ServerResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServerResponse) Validate ¶

func (m *ServerResponse) Validate(formats strfmt.Registry) error

Validate validates this server response

type ServerToServer ¶

type ServerToServer struct {

	// dependent server id
	// Example: default
	Dependent string `json:"dependent,omitempty" yaml:"dependent,omitempty"`

	// authorization server id
	// Example: developer
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// tenant id
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`
}

ServerToServer server to server

swagger:model ServerToServer

func (*ServerToServer) ContextValidate ¶

func (m *ServerToServer) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this server to server based on context it is used

func (*ServerToServer) MarshalBinary ¶

func (m *ServerToServer) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServerToServer) UnmarshalBinary ¶

func (m *ServerToServer) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServerToServer) Validate ¶

func (m *ServerToServer) Validate(formats strfmt.Registry) error

Validate validates this server to server

type ServerToTheme ¶

type ServerToTheme struct {

	// authorization server id
	// Example: developer
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// tenant id
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// theme id
	// Example: acme
	ThemeID string `json:"theme_id,omitempty" yaml:"theme_id,omitempty"`
}

ServerToTheme server to theme

swagger:model ServerToTheme

func (*ServerToTheme) ContextValidate ¶

func (m *ServerToTheme) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this server to theme based on context it is used

func (*ServerToTheme) MarshalBinary ¶

func (m *ServerToTheme) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServerToTheme) UnmarshalBinary ¶

func (m *ServerToTheme) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServerToTheme) Validate ¶

func (m *ServerToTheme) Validate(formats strfmt.Registry) error

Validate validates this server to theme

type ServersBindingsResponse ¶

type ServersBindingsResponse struct {

	// bindings
	Bindings []*ServerBindingResponse `json:"bindings" yaml:"bindings"`
}

ServersBindingsResponse servers bindings response

swagger:model ServersBindingsResponse

func (*ServersBindingsResponse) ContextValidate ¶

func (m *ServersBindingsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this servers bindings response based on the context it is used

func (*ServersBindingsResponse) MarshalBinary ¶

func (m *ServersBindingsResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServersBindingsResponse) UnmarshalBinary ¶

func (m *ServersBindingsResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServersBindingsResponse) Validate ¶

func (m *ServersBindingsResponse) Validate(formats strfmt.Registry) error

Validate validates this servers bindings response

type ServersResponse ¶

type ServersResponse struct {

	// servers
	Servers []*ServerResponse `json:"servers" yaml:"servers"`
}

ServersResponse servers response

swagger:model ServersResponse

func (*ServersResponse) ContextValidate ¶

func (m *ServersResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this servers response based on the context it is used

func (*ServersResponse) MarshalBinary ¶

func (m *ServersResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServersResponse) UnmarshalBinary ¶

func (m *ServersResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServersResponse) Validate ¶

func (m *ServersResponse) Validate(formats strfmt.Registry) error

Validate validates this servers response

type Service ¶

type Service struct {

	// Authorization server identifier
	// Example: my-server
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Custom service audience
	// Example: https://api.example.com
	CustomAudience string `json:"custom_audience,omitempty" yaml:"custom_audience,omitempty"`

	// Service description
	// Example: Service description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Gateway identifier
	// Example: gateway-1
	GatewayID string `json:"gateway_id,omitempty" yaml:"gateway_id,omitempty"`

	// A unique identifier of a service
	// Example: service-1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// Service name
	// Example: My service
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// `true` when the service is a system service
	// Example: false
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// Tenant identifier
	// Example: my-company
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// Service type
	// Enum: [oauth2 oidc system user openbanking]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// The date of service update
	// Format: date-time
	UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"`

	// `true` when the service has the OpenAPI 3.0 specification
	WithSpecification bool `json:"with_specification,omitempty" yaml:"with_specification,omitempty"`
}

Service service

swagger:model Service

func (*Service) ContextValidate ¶

func (m *Service) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this service based on context it is used

func (*Service) MarshalBinary ¶

func (m *Service) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Service) UnmarshalBinary ¶

func (m *Service) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Service) Validate ¶

func (m *Service) Validate(formats strfmt.Registry) error

Validate validates this service

type ServiceAuditPayload ¶

type ServiceAuditPayload struct {

	// Custom service audience
	// Example: https://api.example.com
	CustomAudience string `json:"custom_audience,omitempty" yaml:"custom_audience,omitempty"`

	// Service description
	// Example: Service description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Gateway identifier
	// Example: gateway-1
	GatewayID string `json:"gateway_id,omitempty" yaml:"gateway_id,omitempty"`

	// A unique identifier of a service
	// Example: service-1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// Service name
	// Example: My service
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// `true` when the service is a system service
	// Example: false
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// Service type
	// Enum: [oauth2 oidc system user openbanking]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// The date of service update
	// Format: date-time
	UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"`

	// `true` when the service has the OpenAPI 3.0 specification
	WithSpecification bool `json:"with_specification,omitempty" yaml:"with_specification,omitempty"`
}

ServiceAuditPayload service audit payload

swagger:model ServiceAuditPayload

func (*ServiceAuditPayload) ContextValidate ¶

func (m *ServiceAuditPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this service audit payload based on context it is used

func (*ServiceAuditPayload) MarshalBinary ¶

func (m *ServiceAuditPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServiceAuditPayload) UnmarshalBinary ¶

func (m *ServiceAuditPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServiceAuditPayload) Validate ¶

func (m *ServiceAuditPayload) Validate(formats strfmt.Registry) error

Validate validates this service audit payload

type ServiceResponse ¶

type ServiceResponse struct {

	// audience
	Audience string `json:"audience,omitempty" yaml:"audience,omitempty"`

	// Authorization server identifier
	// Example: my-server
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Custom service audience
	// Example: https://api.example.com
	CustomAudience string `json:"custom_audience,omitempty" yaml:"custom_audience,omitempty"`

	// Service description
	// Example: Service description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Gateway identifier
	// Example: gateway-1
	GatewayID string `json:"gateway_id,omitempty" yaml:"gateway_id,omitempty"`

	// A unique identifier of a service
	// Example: service-1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// Service name
	// Example: My service
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// number of apis
	NumberOfApis int64 `json:"number_of_apis,omitempty" yaml:"number_of_apis,omitempty"`

	// number of scopes
	NumberOfScopes int64 `json:"number_of_scopes,omitempty" yaml:"number_of_scopes,omitempty"`

	// number of subscribers
	NumberOfSubscribers int64 `json:"number_of_subscribers,omitempty" yaml:"number_of_subscribers,omitempty"`

	// `true` when the service is a system service
	// Example: false
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// Tenant identifier
	// Example: my-company
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// Service type
	// Enum: [oauth2 oidc system user openbanking]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// The date of service update
	// Format: date-time
	UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"`

	// `true` when the service has the OpenAPI 3.0 specification
	WithSpecification bool `json:"with_specification,omitempty" yaml:"with_specification,omitempty"`
}

ServiceResponse service response

swagger:model ServiceResponse

func (*ServiceResponse) ContextValidate ¶

func (m *ServiceResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this service response based on context it is used

func (*ServiceResponse) MarshalBinary ¶

func (m *ServiceResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServiceResponse) UnmarshalBinary ¶

func (m *ServiceResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServiceResponse) Validate ¶

func (m *ServiceResponse) Validate(formats strfmt.Registry) error

Validate validates this service response

type ServiceWithAudience ¶

type ServiceWithAudience struct {

	// audience
	Audience string `json:"audience,omitempty" yaml:"audience,omitempty"`

	// Authorization server identifier
	// Example: my-server
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Custom service audience
	// Example: https://api.example.com
	CustomAudience string `json:"custom_audience,omitempty" yaml:"custom_audience,omitempty"`

	// Service description
	// Example: Service description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Gateway identifier
	// Example: gateway-1
	GatewayID string `json:"gateway_id,omitempty" yaml:"gateway_id,omitempty"`

	// A unique identifier of a service
	// Example: service-1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// Service name
	// Example: My service
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// `true` when the service is a system service
	// Example: false
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// Tenant identifier
	// Example: my-company
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// Service type
	// Enum: [oauth2 oidc system user openbanking]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// The date of service update
	// Format: date-time
	UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"`

	// `true` when the service has the OpenAPI 3.0 specification
	WithSpecification bool `json:"with_specification,omitempty" yaml:"with_specification,omitempty"`
}

ServiceWithAudience service with audience

swagger:model ServiceWithAudience

func (*ServiceWithAudience) ContextValidate ¶

func (m *ServiceWithAudience) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this service with audience based on context it is used

func (*ServiceWithAudience) MarshalBinary ¶

func (m *ServiceWithAudience) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServiceWithAudience) UnmarshalBinary ¶

func (m *ServiceWithAudience) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServiceWithAudience) Validate ¶

func (m *ServiceWithAudience) Validate(formats strfmt.Registry) error

Validate validates this service with audience

type ServiceWithScopesResponse ¶

type ServiceWithScopesResponse struct {

	// audience
	Audience string `json:"audience,omitempty" yaml:"audience,omitempty"`

	// Authorization server identifier
	// Example: my-server
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Custom service audience
	// Example: https://api.example.com
	CustomAudience string `json:"custom_audience,omitempty" yaml:"custom_audience,omitempty"`

	// Service description
	// Example: Service description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Gateway identifier
	// Example: gateway-1
	GatewayID string `json:"gateway_id,omitempty" yaml:"gateway_id,omitempty"`

	// A unique identifier of a service
	// Example: service-1
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// Service name
	// Example: My service
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// list of scopes
	Scopes []*Scope `json:"scopes" yaml:"scopes"`

	// `true` when the service is a system service
	// Example: false
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// Tenant identifier
	// Example: my-company
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// Service type
	// Enum: [oauth2 oidc system user openbanking]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// The date of service update
	// Format: date-time
	UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"`

	// `true` when the service has the OpenAPI 3.0 specification
	WithSpecification bool `json:"with_specification,omitempty" yaml:"with_specification,omitempty"`
}

ServiceWithScopesResponse service with scopes response

swagger:model ServiceWithScopesResponse

func (*ServiceWithScopesResponse) ContextValidate ¶

func (m *ServiceWithScopesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this service with scopes response based on the context it is used

func (*ServiceWithScopesResponse) MarshalBinary ¶

func (m *ServiceWithScopesResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServiceWithScopesResponse) UnmarshalBinary ¶

func (m *ServiceWithScopesResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServiceWithScopesResponse) Validate ¶

func (m *ServiceWithScopesResponse) Validate(formats strfmt.Registry) error

Validate validates this service with scopes response

type ServicesResponse ¶

type ServicesResponse struct {

	// services
	Services []*ServiceResponse `json:"services" yaml:"services"`
}

ServicesResponse services response

swagger:model ServicesResponse

func (*ServicesResponse) ContextValidate ¶

func (m *ServicesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this services response based on the context it is used

func (*ServicesResponse) MarshalBinary ¶

func (m *ServicesResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ServicesResponse) UnmarshalBinary ¶

func (m *ServicesResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ServicesResponse) Validate ¶

func (m *ServicesResponse) Validate(formats strfmt.Registry) error

Validate validates this services response

type SpecVersion ¶

type SpecVersion string

SpecVersion spec version

swagger:model SpecVersion

func (SpecVersion) ContextValidate ¶

func (m SpecVersion) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this spec version based on context it is used

func (SpecVersion) Validate ¶

func (m SpecVersion) Validate(formats strfmt.Registry) error

Validate validates this spec version

type StaticCredentials ¶

type StaticCredentials struct {

	// An array of users, their credentials and authentication context.
	//
	// The `users` parameter accepts a JSON of user data. You can add multiple users, define their
	// usernames and passwords. You can also enrich their authentication context.
	Users []*StaticUser `json:"users" yaml:"users"`
}

StaticCredentials Static IDP specific credentials

swagger:model StaticCredentials

func (*StaticCredentials) ContextValidate ¶

func (m *StaticCredentials) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this static credentials based on the context it is used

func (*StaticCredentials) MarshalBinary ¶

func (m *StaticCredentials) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*StaticCredentials) UnmarshalBinary ¶

func (m *StaticCredentials) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*StaticCredentials) Validate ¶

func (m *StaticCredentials) Validate(formats strfmt.Registry) error

Validate validates this static credentials

type StaticIDP ¶

type StaticIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// credentials
	Credentials *StaticCredentials `json:"credentials,omitempty" yaml:"credentials,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// settings
	Settings *StaticSettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

StaticIDP static ID p

swagger:model StaticIDP

func (*StaticIDP) ContextValidate ¶

func (m *StaticIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this static ID p based on the context it is used

func (*StaticIDP) MarshalBinary ¶

func (m *StaticIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*StaticIDP) UnmarshalBinary ¶

func (m *StaticIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*StaticIDP) Validate ¶

func (m *StaticIDP) Validate(formats strfmt.Registry) error

Validate validates this static ID p

type StaticSettings ¶

type StaticSettings struct {

	// If enabled, a hint message is displayed
	Hint bool `json:"hint,omitempty" yaml:"hint,omitempty"`
}

StaticSettings Static IDP specific settings

swagger:model StaticSettings

func (*StaticSettings) ContextValidate ¶

func (m *StaticSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this static settings based on context it is used

func (*StaticSettings) MarshalBinary ¶

func (m *StaticSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*StaticSettings) UnmarshalBinary ¶

func (m *StaticSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*StaticSettings) Validate ¶

func (m *StaticSettings) Validate(formats strfmt.Registry) error

Validate validates this static settings

type StaticUser ¶

type StaticUser struct {

	// additional attributes
	AdditionalAttributes AuthenticationContext `json:"additional_attributes,omitempty" yaml:"additional_attributes,omitempty"`

	// authentication context
	AuthenticationContext AuthenticationContext `json:"authentication_context,omitempty" yaml:"authentication_context,omitempty"`

	// User's preferred email.
	Email string `json:"email,omitempty" yaml:"email,omitempty"`

	// If set to true, indicates that the user's email was verified.
	EmailVerified bool `json:"email_verified,omitempty" yaml:"email_verified,omitempty"`

	// User password.
	// Example: secret
	Password string `json:"password,omitempty" yaml:"password,omitempty"`

	// User's preferred phone number
	PhoneNumber string `json:"phone_number,omitempty" yaml:"phone_number,omitempty"`

	// If set to true, indicates that the user's phone number was verified.
	PhoneNumberVerified bool `json:"phone_number_verified,omitempty" yaml:"phone_number_verified,omitempty"`

	// User login.
	// Example: peter
	Username string `json:"username,omitempty" yaml:"username,omitempty"`
}

StaticUser static user

swagger:model StaticUser

func (*StaticUser) ContextValidate ¶

func (m *StaticUser) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this static user based on the context it is used

func (*StaticUser) MarshalBinary ¶

func (m *StaticUser) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*StaticUser) UnmarshalBinary ¶

func (m *StaticUser) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*StaticUser) Validate ¶

func (m *StaticUser) Validate(formats strfmt.Registry) error

Validate validates this static user

type Styling ¶

type Styling struct {

	// colors
	Colors StylingColors `json:"colors,omitempty" yaml:"colors,omitempty"`

	// font url
	FontURL string `json:"font_url,omitempty" yaml:"font_url,omitempty"`

	// logo size
	LogoSize string `json:"logo_size,omitempty" yaml:"logo_size,omitempty"`

	// logo url
	LogoURL string `json:"logo_url,omitempty" yaml:"logo_url,omitempty"`
}

Styling styling

swagger:model Styling

func (*Styling) ContextValidate ¶

func (m *Styling) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this styling based on the context it is used

func (*Styling) MarshalBinary ¶

func (m *Styling) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Styling) UnmarshalBinary ¶

func (m *Styling) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Styling) Validate ¶

func (m *Styling) Validate(formats strfmt.Registry) error

Validate validates this styling

type StylingColors ¶

type StylingColors struct {

	// background
	Background string `json:"background,omitempty" yaml:"background,omitempty"`

	// header
	Header string `json:"header,omitempty" yaml:"header,omitempty"`

	// primary
	Primary string `json:"primary,omitempty" yaml:"primary,omitempty"`
}

StylingColors styling colors

swagger:model StylingColors

func (*StylingColors) ContextValidate ¶

func (m *StylingColors) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this styling colors based on context it is used

func (*StylingColors) MarshalBinary ¶

func (m *StylingColors) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*StylingColors) UnmarshalBinary ¶

func (m *StylingColors) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*StylingColors) Validate ¶

func (m *StylingColors) Validate(formats strfmt.Registry) error

Validate validates this styling colors

type SupportedJSONSchema ¶

type SupportedJSONSchema struct {

	// additional properties
	AdditionalProperties bool `json:"additionalProperties,omitempty" yaml:"additionalProperties,omitempty"`

	// all of
	AllOf []*SupportedJSONSchema `json:"allOf" yaml:"allOf"`

	// any of
	AnyOf []*SupportedJSONSchema `json:"anyOf" yaml:"anyOf"`

	// const
	Const string `json:"const,omitempty" yaml:"const,omitempty"`

	// contains
	Contains *SupportedJSONSchema `json:"contains,omitempty" yaml:"contains,omitempty"`

	// dependent required
	DependentRequired map[string][]string `json:"dependentRequired,omitempty" yaml:"dependentRequired,omitempty"`

	// dependent schemas
	DependentSchemas map[string]SupportedJSONSchema `json:"dependentSchemas,omitempty" yaml:"dependentSchemas,omitempty"`

	// description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// else
	Else *SupportedJSONSchema `json:"else,omitempty" yaml:"else,omitempty"`

	// enum
	Enum []string `json:"enum" yaml:"enum"`

	// exclusive maximum
	ExclusiveMaximum int64 `json:"exclusiveMaximum,omitempty" yaml:"exclusiveMaximum,omitempty"`

	// exclusive minimum
	ExclusiveMinimum int64 `json:"exclusiveMinimum,omitempty" yaml:"exclusiveMinimum,omitempty"`

	// hidden
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// if
	If *SupportedJSONSchema `json:"if,omitempty" yaml:"if,omitempty"`

	// items
	Items *SupportedJSONSchema `json:"items,omitempty" yaml:"items,omitempty"`

	// max contains
	MaxContains int64 `json:"maxContains,omitempty" yaml:"maxContains,omitempty"`

	// arrays
	MaxItems int64 `json:"maxItems,omitempty" yaml:"maxItems,omitempty"`

	// strings
	MaxLength int64 `json:"maxLength,omitempty" yaml:"maxLength,omitempty"`

	// objects
	MaxProperties int64 `json:"maxProperties,omitempty" yaml:"maxProperties,omitempty"`

	// maximum
	Maximum int64 `json:"maximum,omitempty" yaml:"maximum,omitempty"`

	// min contains
	MinContains int64 `json:"minContains,omitempty" yaml:"minContains,omitempty"`

	// min items
	MinItems int64 `json:"minItems,omitempty" yaml:"minItems,omitempty"`

	// min length
	MinLength int64 `json:"minLength,omitempty" yaml:"minLength,omitempty"`

	// min properties
	MinProperties int64 `json:"minProperties,omitempty" yaml:"minProperties,omitempty"`

	// minimum
	Minimum int64 `json:"minimum,omitempty" yaml:"minimum,omitempty"`

	// numeric
	MultipleOf int64 `json:"multipleOf,omitempty" yaml:"multipleOf,omitempty"`

	// not
	Not *SupportedJSONSchema `json:"not,omitempty" yaml:"not,omitempty"`

	// one of
	OneOf []*SupportedJSONSchema `json:"oneOf" yaml:"oneOf"`

	// pattern
	Pattern string `json:"pattern,omitempty" yaml:"pattern,omitempty"`

	// pattern properties
	PatternProperties map[string]SupportedJSONSchema `json:"patternProperties,omitempty" yaml:"patternProperties,omitempty"`

	// properties
	Properties map[string]SupportedJSONSchema `json:"properties,omitempty" yaml:"properties,omitempty"`

	// property names
	PropertyNames *SupportedJSONSchema `json:"propertyNames,omitempty" yaml:"propertyNames,omitempty"`

	// required
	Required []string `json:"required" yaml:"required"`

	// then
	Then *SupportedJSONSchema `json:"then,omitempty" yaml:"then,omitempty"`

	// any
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// unique items
	UniqueItems bool `json:"uniqueItems,omitempty" yaml:"uniqueItems,omitempty"`
}

SupportedJSONSchema supported JSON schema

swagger:model SupportedJSONSchema

func (*SupportedJSONSchema) ContextValidate ¶

func (m *SupportedJSONSchema) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this supported JSON schema based on the context it is used

func (*SupportedJSONSchema) MarshalBinary ¶

func (m *SupportedJSONSchema) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*SupportedJSONSchema) UnmarshalBinary ¶

func (m *SupportedJSONSchema) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*SupportedJSONSchema) Validate ¶

func (m *SupportedJSONSchema) Validate(formats strfmt.Registry) error

Validate validates this supported JSON schema

type SystemAPIBindings ¶

type SystemAPIBindings struct {

	// bindings
	Bindings []*CrossTenantAPIPolicyBinding `json:"bindings" yaml:"bindings"`
}

SystemAPIBindings system API bindings

swagger:model SystemAPIBindings

func (*SystemAPIBindings) ContextValidate ¶

func (m *SystemAPIBindings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this system API bindings based on the context it is used

func (*SystemAPIBindings) MarshalBinary ¶

func (m *SystemAPIBindings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*SystemAPIBindings) UnmarshalBinary ¶

func (m *SystemAPIBindings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*SystemAPIBindings) Validate ¶

func (m *SystemAPIBindings) Validate(formats strfmt.Registry) error

Validate validates this system API bindings

type SystemServicesResponse ¶

type SystemServicesResponse struct {

	// services
	Services []*Service `json:"services" yaml:"services"`
}

SystemServicesResponse system services response

swagger:model SystemServicesResponse

func (*SystemServicesResponse) ContextValidate ¶

func (m *SystemServicesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this system services response based on the context it is used

func (*SystemServicesResponse) MarshalBinary ¶

func (m *SystemServicesResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*SystemServicesResponse) UnmarshalBinary ¶

func (m *SystemServicesResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*SystemServicesResponse) Validate ¶

func (m *SystemServicesResponse) Validate(formats strfmt.Registry) error

Validate validates this system services response

type TaskAuditPayload ¶

type TaskAuditPayload struct {

	// attributes
	Attributes interface{} `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// error
	Error string `json:"error,omitempty" yaml:"error,omitempty"`

	// name
	Name string `json:"name,omitempty" yaml:"name,omitempty"`
}

TaskAuditPayload task audit payload

swagger:model TaskAuditPayload

func (*TaskAuditPayload) ContextValidate ¶

func (m *TaskAuditPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this task audit payload based on context it is used

func (*TaskAuditPayload) MarshalBinary ¶

func (m *TaskAuditPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TaskAuditPayload) UnmarshalBinary ¶

func (m *TaskAuditPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TaskAuditPayload) Validate ¶

func (m *TaskAuditPayload) Validate(formats strfmt.Registry) error

Validate validates this task audit payload

type Template ¶

type Template struct {

	// content of the template
	Content string `json:"content,omitempty" yaml:"content,omitempty"`

	// timestamp when the template was created
	// Format: date-time
	CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"`

	// path to the template in a filesystem zip archive
	// Required: true
	FsPath string `json:"fs_path" yaml:"fs_path"`

	// ID of the tenant
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// theme unique identifier
	// Required: true
	ThemeID string `json:"theme_id" yaml:"theme_id"`

	// timestamp when the template was last updated
	// Format: date-time
	UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"`
}

Template Custom Branding template

swagger:model Template

func (*Template) ContextValidate ¶

func (m *Template) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this template based on context it is used

func (*Template) MarshalBinary ¶

func (m *Template) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Template) UnmarshalBinary ¶

func (m *Template) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Template) Validate ¶

func (m *Template) Validate(formats strfmt.Registry) error

Validate validates this template

type TemplatePaths ¶

type TemplatePaths struct {

	// list of template paths
	FsPaths []string `json:"fs_paths" yaml:"fs_paths"`
}

TemplatePaths template paths

swagger:model TemplatePaths

func (*TemplatePaths) ContextValidate ¶

func (m *TemplatePaths) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this template paths based on context it is used

func (*TemplatePaths) MarshalBinary ¶

func (m *TemplatePaths) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TemplatePaths) UnmarshalBinary ¶

func (m *TemplatePaths) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TemplatePaths) Validate ¶

func (m *TemplatePaths) Validate(formats strfmt.Registry) error

Validate validates this template paths

type Tenant ¶

type Tenant struct {

	// tenant unique identifier
	// exampe: default
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// jwks
	Jwks *ServerJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"`

	// license
	License *License `json:"license,omitempty" yaml:"license,omitempty"`

	// metadata
	Metadata TenantMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// tenant name
	// Example: Default
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// settings
	Settings *TenantSettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// styling
	Styling *Styling `json:"styling,omitempty" yaml:"styling,omitempty"`

	// optional custom tenant url. If not provided the server url is used instead
	// Example: https://example.com/default
	URL string `json:"url,omitempty" yaml:"url,omitempty"`
}

Tenant tenant

swagger:model Tenant

func (*Tenant) ContextValidate ¶

func (m *Tenant) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this tenant based on the context it is used

func (*Tenant) MarshalBinary ¶

func (m *Tenant) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Tenant) UnmarshalBinary ¶

func (m *Tenant) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Tenant) Validate ¶

func (m *Tenant) Validate(formats strfmt.Registry) error

Validate validates this tenant

type TenantMetadata ¶

type TenantMetadata map[string]interface{}

TenantMetadata tenant metadata

swagger:model TenantMetadata

func (TenantMetadata) ContextValidate ¶

func (m TenantMetadata) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this tenant metadata based on context it is used

func (TenantMetadata) Validate ¶

func (m TenantMetadata) Validate(formats strfmt.Registry) error

Validate validates this tenant metadata

type TenantPayload ¶

type TenantPayload struct {

	// tenant unique identifier
	// exampe: default
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// jwks
	Jwks *ServerJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"`

	// metadata
	Metadata TenantMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// tenant name
	// Example: Default
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// settings
	Settings *TenantSettings `json:"settings,omitempty" yaml:"settings,omitempty"`

	// styling
	Styling *Styling `json:"styling,omitempty" yaml:"styling,omitempty"`

	// optional custom tenant url. If not provided the server url is used instead
	// Example: https://example.com/default
	URL string `json:"url,omitempty" yaml:"url,omitempty"`
}

TenantPayload tenant payload

swagger:model TenantPayload

func (*TenantPayload) ContextValidate ¶

func (m *TenantPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this tenant payload based on the context it is used

func (*TenantPayload) MarshalBinary ¶

func (m *TenantPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TenantPayload) UnmarshalBinary ¶

func (m *TenantPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TenantPayload) Validate ¶

func (m *TenantPayload) Validate(formats strfmt.Registry) error

Validate validates this tenant payload

type TenantPermissionsResponse ¶

type TenantPermissionsResponse struct {

	// create identity pool
	CreateIdentityPool bool `json:"create_identity_pool,omitempty" yaml:"create_identity_pool,omitempty"`

	// create organization
	CreateOrganization bool `json:"create_organization,omitempty" yaml:"create_organization,omitempty"`

	// create workspace
	CreateWorkspace bool `json:"create_workspace,omitempty" yaml:"create_workspace,omitempty"`

	// get tenant
	GetTenant bool `json:"get_tenant,omitempty" yaml:"get_tenant,omitempty"`

	// list identity pools
	ListIdentityPools bool `json:"list_identity_pools,omitempty" yaml:"list_identity_pools,omitempty"`

	// list organizations
	ListOrganizations bool `json:"list_organizations,omitempty" yaml:"list_organizations,omitempty"`

	// list workspaces
	ListWorkspaces bool `json:"list_workspaces,omitempty" yaml:"list_workspaces,omitempty"`

	// manage admin role
	ManageAdminRole bool `json:"manage_admin_role,omitempty" yaml:"manage_admin_role,omitempty"`

	// manage auditor role
	ManageAuditorRole bool `json:"manage_auditor_role,omitempty" yaml:"manage_auditor_role,omitempty"`

	// manage brute force protection
	ManageBruteForceProtection bool `json:"manage_brute_force_protection,omitempty" yaml:"manage_brute_force_protection,omitempty"`

	// manage business admin role
	ManageBusinessAdminRole bool `json:"manage_business_admin_role,omitempty" yaml:"manage_business_admin_role,omitempty"`

	// manage member role
	ManageMemberRole bool `json:"manage_member_role,omitempty" yaml:"manage_member_role,omitempty"`

	// manage mfa methods
	ManageMfaMethods bool `json:"manage_mfa_methods,omitempty" yaml:"manage_mfa_methods,omitempty"`

	// manage permission systems
	ManagePermissionSystems bool `json:"manage_permission_systems,omitempty" yaml:"manage_permission_systems,omitempty"`

	// manage privacy
	ManagePrivacy bool `json:"manage_privacy,omitempty" yaml:"manage_privacy,omitempty"`

	// manage server bindings
	ManageServerBindings bool `json:"manage_server_bindings,omitempty" yaml:"manage_server_bindings,omitempty"`

	// manage themes
	ManageThemes bool `json:"manage_themes,omitempty" yaml:"manage_themes,omitempty"`

	// manage vanity domains
	ManageVanityDomains bool `json:"manage_vanity_domains,omitempty" yaml:"manage_vanity_domains,omitempty"`

	// read brute force protection
	ReadBruteForceProtection bool `json:"read_brute_force_protection,omitempty" yaml:"read_brute_force_protection,omitempty"`

	// read mfa methods
	ReadMfaMethods bool `json:"read_mfa_methods,omitempty" yaml:"read_mfa_methods,omitempty"`

	// read permission systems
	ReadPermissionSystems bool `json:"read_permission_systems,omitempty" yaml:"read_permission_systems,omitempty"`

	// read privacy
	ReadPrivacy bool `json:"read_privacy,omitempty" yaml:"read_privacy,omitempty"`

	// read roles
	ReadRoles bool `json:"read_roles,omitempty" yaml:"read_roles,omitempty"`

	// read server bindings
	ReadServerBindings bool `json:"read_server_bindings,omitempty" yaml:"read_server_bindings,omitempty"`

	// read system apis
	ReadSystemApis bool `json:"read_system_apis,omitempty" yaml:"read_system_apis,omitempty"`

	// read system environment
	ReadSystemEnvironment bool `json:"read_system_environment,omitempty" yaml:"read_system_environment,omitempty"`

	// read system notifications
	ReadSystemNotifications bool `json:"read_system_notifications,omitempty" yaml:"read_system_notifications,omitempty"`

	// read system services
	ReadSystemServices bool `json:"read_system_services,omitempty" yaml:"read_system_services,omitempty"`

	// read system templates
	ReadSystemTemplates bool `json:"read_system_templates,omitempty" yaml:"read_system_templates,omitempty"`

	// read themes
	ReadThemes bool `json:"read_themes,omitempty" yaml:"read_themes,omitempty"`

	// read vanity domains
	ReadVanityDomains bool `json:"read_vanity_domains,omitempty" yaml:"read_vanity_domains,omitempty"`

	// tenant read analytics
	TenantReadAnalytics bool `json:"tenant_read_analytics,omitempty" yaml:"tenant_read_analytics,omitempty"`

	// update tenant
	UpdateTenant bool `json:"update_tenant,omitempty" yaml:"update_tenant,omitempty"`
}

TenantPermissionsResponse tenant permissions response

swagger:model TenantPermissionsResponse

func (*TenantPermissionsResponse) ContextValidate ¶

func (m *TenantPermissionsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this tenant permissions response based on context it is used

func (*TenantPermissionsResponse) MarshalBinary ¶

func (m *TenantPermissionsResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TenantPermissionsResponse) UnmarshalBinary ¶

func (m *TenantPermissionsResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TenantPermissionsResponse) Validate ¶

func (m *TenantPermissionsResponse) Validate(formats strfmt.Registry) error

Validate validates this tenant permissions response

type TenantRoleSubject ¶

type TenantRoleSubject struct {

	// identity pool user pool id
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// identity pool user id
	IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"`

	// idp user idp id
	IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"`

	// roles
	Roles *TenantRoles `json:"roles,omitempty" yaml:"roles,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	// Enum: [identity_pool_user idp]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// idp user workspace id
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

TenantRoleSubject tenant role subject

swagger:model TenantRoleSubject

func (*TenantRoleSubject) ContextValidate ¶

func (m *TenantRoleSubject) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this tenant role subject based on the context it is used

func (*TenantRoleSubject) MarshalBinary ¶

func (m *TenantRoleSubject) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TenantRoleSubject) UnmarshalBinary ¶

func (m *TenantRoleSubject) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TenantRoleSubject) Validate ¶

func (m *TenantRoleSubject) Validate(formats strfmt.Registry) error

Validate validates this tenant role subject

type TenantRoles ¶

type TenantRoles struct {

	// admin
	Admin bool `json:"admin,omitempty" yaml:"admin,omitempty"`

	// auditor
	Auditor bool `json:"auditor,omitempty" yaml:"auditor,omitempty"`

	// business admin
	BusinessAdmin bool `json:"business_admin,omitempty" yaml:"business_admin,omitempty"`

	// member
	Member bool `json:"member,omitempty" yaml:"member,omitempty"`
}

TenantRoles tenant roles

swagger:model TenantRoles

func (*TenantRoles) ContextValidate ¶

func (m *TenantRoles) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this tenant roles based on context it is used

func (*TenantRoles) MarshalBinary ¶

func (m *TenantRoles) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TenantRoles) UnmarshalBinary ¶

func (m *TenantRoles) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TenantRoles) Validate ¶

func (m *TenantRoles) Validate(formats strfmt.Registry) error

Validate validates this tenant roles

type TenantRolesResponse ¶

type TenantRolesResponse struct {

	// subjects
	Subjects []*TenantRoleSubject `json:"subjects" yaml:"subjects"`
}

TenantRolesResponse tenant roles response

swagger:model TenantRolesResponse

func (*TenantRolesResponse) ContextValidate ¶

func (m *TenantRolesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this tenant roles response based on the context it is used

func (*TenantRolesResponse) MarshalBinary ¶

func (m *TenantRolesResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TenantRolesResponse) UnmarshalBinary ¶

func (m *TenantRolesResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TenantRolesResponse) Validate ¶

func (m *TenantRolesResponse) Validate(formats strfmt.Registry) error

Validate validates this tenant roles response

type TenantSettings ¶

type TenantSettings struct {

	// default template id
	DefaultTemplateID string `json:"default_template_id,omitempty" yaml:"default_template_id,omitempty"`

	// default workspace id
	DefaultWorkspaceID string `json:"default_workspace_id,omitempty" yaml:"default_workspace_id,omitempty"`
}

TenantSettings tenant settings

swagger:model TenantSettings

func (*TenantSettings) ContextValidate ¶

func (m *TenantSettings) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this tenant settings based on context it is used

func (*TenantSettings) MarshalBinary ¶

func (m *TenantSettings) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TenantSettings) UnmarshalBinary ¶

func (m *TenantSettings) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TenantSettings) Validate ¶

func (m *TenantSettings) Validate(formats strfmt.Registry) error

Validate validates this tenant settings

type TestAPIResult ¶

type TestAPIResult struct {

	// graphql types
	GraphqlTypes GraphQLTypes `json:"graphql_types,omitempty" yaml:"graphql_types,omitempty"`

	// match
	Match bool `json:"match,omitempty" yaml:"match,omitempty"`

	// policy id
	PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"`
}

TestAPIResult test API result

swagger:model TestAPIResult

func (*TestAPIResult) ContextValidate ¶

func (m *TestAPIResult) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this test API result based on the context it is used

func (*TestAPIResult) MarshalBinary ¶

func (m *TestAPIResult) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TestAPIResult) UnmarshalBinary ¶

func (m *TestAPIResult) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TestAPIResult) Validate ¶

func (m *TestAPIResult) Validate(formats strfmt.Registry) error

Validate validates this test API result

type TestMFAMethodRequest ¶

type TestMFAMethodRequest struct {

	// address
	// Required: true
	Address string `json:"address" yaml:"address"`
}

TestMFAMethodRequest test m f a method request

swagger:model TestMFAMethodRequest

func (*TestMFAMethodRequest) ContextValidate ¶

func (m *TestMFAMethodRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this test m f a method request based on context it is used

func (*TestMFAMethodRequest) MarshalBinary ¶

func (m *TestMFAMethodRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TestMFAMethodRequest) UnmarshalBinary ¶

func (m *TestMFAMethodRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TestMFAMethodRequest) Validate ¶

func (m *TestMFAMethodRequest) Validate(formats strfmt.Registry) error

Validate validates this test m f a method request

type TestPolicyDefinition ¶

type TestPolicyDefinition struct {

	// The definition of an Open Policy Agent (OPA) policy provided using the REGO language.
	Definition string `json:"definition,omitempty" yaml:"definition,omitempty"`

	// Language of a policy
	//
	// ACP supports creating Cloudentity policies (using a visual editor or defined using JSON or
	// YAML) and Open Policy Agent (OPA) policies (defined using REGO).
	//
	// OPA is a policy engine that unifies policy enforcement and provides a high-level declarative
	// language (REGO) that lets you specify policies as code. REGO supports referencing nested
	// documents and ensures that your queries are correct and unambiguous.
	// Example: cloudentity
	Language string `json:"language,omitempty" yaml:"language,omitempty"`

	// An array of validators for a Cloudentity policy
	Validators []*ValidatorConfig `json:"validators" yaml:"validators"`
}

TestPolicyDefinition Definition of a policy that you wish to test

swagger:model TestPolicyDefinition

func (*TestPolicyDefinition) ContextValidate ¶

func (m *TestPolicyDefinition) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this test policy definition based on the context it is used

func (*TestPolicyDefinition) MarshalBinary ¶

func (m *TestPolicyDefinition) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TestPolicyDefinition) UnmarshalBinary ¶

func (m *TestPolicyDefinition) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TestPolicyDefinition) Validate ¶

func (m *TestPolicyDefinition) Validate(formats strfmt.Registry) error

Validate validates this test policy definition

type TestPolicyInput ¶

type TestPolicyInput struct {

	// authn ctx
	AuthnCtx AuthenticationContext `json:"authn_ctx,omitempty" yaml:"authn_ctx,omitempty"`

	// Contexts for your policy validation
	Contexts map[string]interface{} `json:"contexts,omitempty" yaml:"contexts,omitempty"`

	// request
	Request *TestPolicyInputRequest `json:"request,omitempty" yaml:"request,omitempty"`
}

TestPolicyInput Contains the input for the request that is used to test the policy.

swagger:model TestPolicyInput

func (*TestPolicyInput) ContextValidate ¶

func (m *TestPolicyInput) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this test policy input based on the context it is used

func (*TestPolicyInput) MarshalBinary ¶

func (m *TestPolicyInput) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TestPolicyInput) UnmarshalBinary ¶

func (m *TestPolicyInput) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TestPolicyInput) Validate ¶

func (m *TestPolicyInput) Validate(formats strfmt.Registry) error

Validate validates this test policy input

type TestPolicyInputRequest ¶

type TestPolicyInputRequest struct {

	// Body that is used in your request that you use to test your policy
	Body string `json:"body,omitempty" yaml:"body,omitempty"`

	// Headers that are used in your request that you use to test your policy
	Headers map[string][]string `json:"headers,omitempty" yaml:"headers,omitempty"`

	// Method that is used in your request that you use to test your policy
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Path that is used in your request that you use to test your policy
	Path string `json:"path,omitempty" yaml:"path,omitempty"`

	// Path parameters that are used in your request that you use to test your policy
	PathParams map[string]string `json:"path_params,omitempty" yaml:"path_params,omitempty"`

	// Query parameters that are used in your request that you use to test your policy
	QueryParams map[string][]string `json:"query_params,omitempty" yaml:"query_params,omitempty"`
}

TestPolicyInputRequest test policy input request

swagger:model TestPolicyInputRequest

func (*TestPolicyInputRequest) ContextValidate ¶

func (m *TestPolicyInputRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this test policy input request based on context it is used

func (*TestPolicyInputRequest) MarshalBinary ¶

func (m *TestPolicyInputRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TestPolicyInputRequest) UnmarshalBinary ¶

func (m *TestPolicyInputRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TestPolicyInputRequest) Validate ¶

func (m *TestPolicyInputRequest) Validate(formats strfmt.Registry) error

Validate validates this test policy input request

type TestPolicyRequest ¶

type TestPolicyRequest struct {

	// input
	Input *TestPolicyInput `json:"input,omitempty" yaml:"input,omitempty"`

	// policy
	Policy *TestPolicyDefinition `json:"policy,omitempty" yaml:"policy,omitempty"`

	// Authorization server (workspace) ID
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`
}

TestPolicyRequest test policy request

swagger:model TestPolicyRequest

func (*TestPolicyRequest) ContextValidate ¶

func (m *TestPolicyRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this test policy request based on the context it is used

func (*TestPolicyRequest) MarshalBinary ¶

func (m *TestPolicyRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TestPolicyRequest) UnmarshalBinary ¶

func (m *TestPolicyRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TestPolicyRequest) Validate ¶

func (m *TestPolicyRequest) Validate(formats strfmt.Registry) error

Validate validates this test policy request

type TestPolicyResponse ¶

type TestPolicyResponse struct {

	// failures
	Failures []*ValidateResponseValidatorFailure `json:"failures" yaml:"failures"`

	// output
	Output map[string]interface{} `json:"output,omitempty" yaml:"output,omitempty"`

	// recovery
	Recovery []interface{} `json:"recovery" yaml:"recovery"`

	// result
	Result string `json:"result,omitempty" yaml:"result,omitempty"`

	// status
	Status bool `json:"status,omitempty" yaml:"status,omitempty"`
}

TestPolicyResponse test policy response

swagger:model TestPolicyResponse

func (*TestPolicyResponse) ContextValidate ¶

func (m *TestPolicyResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this test policy response based on the context it is used

func (*TestPolicyResponse) MarshalBinary ¶

func (m *TestPolicyResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TestPolicyResponse) UnmarshalBinary ¶

func (m *TestPolicyResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TestPolicyResponse) Validate ¶

func (m *TestPolicyResponse) Validate(formats strfmt.Registry) error

Validate validates this test policy response

type TestRequest ¶

type TestRequest struct {

	// api
	// Required: true
	API *API `json:"api" yaml:"api"`

	// test request
	// Required: true
	TestRequest *HTTPRequest `json:"test_request" yaml:"test_request"`
}

TestRequest test request

swagger:model TestRequest

func (*TestRequest) ContextValidate ¶

func (m *TestRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this test request based on the context it is used

func (*TestRequest) MarshalBinary ¶

func (m *TestRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TestRequest) UnmarshalBinary ¶

func (m *TestRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TestRequest) Validate ¶

func (m *TestRequest) Validate(formats strfmt.Registry) error

Validate validates this test request

type TestScriptRequest ¶

type TestScriptRequest struct {

	// Contains the script source for testing
	Body string `json:"body,omitempty" yaml:"body,omitempty"`

	// Contains the input for the script
	Input map[string]interface{} `json:"input,omitempty" yaml:"input,omitempty"`
}

TestScriptRequest test script request

swagger:model TestScriptRequest

func (*TestScriptRequest) ContextValidate ¶

func (m *TestScriptRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this test script request based on context it is used

func (*TestScriptRequest) MarshalBinary ¶

func (m *TestScriptRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TestScriptRequest) UnmarshalBinary ¶

func (m *TestScriptRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TestScriptRequest) Validate ¶

func (m *TestScriptRequest) Validate(formats strfmt.Registry) error

Validate validates this test script request

type Theme ¶

type Theme struct {

	// theme unique identifier
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// theme logo url
	LogoURL string `json:"logo_url,omitempty" yaml:"logo_url,omitempty"`

	// Display name of the theme
	// Example: acme
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// ID of the tenant
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`
}

Theme Custom Branding theme

swagger:model Theme

func (*Theme) ContextValidate ¶

func (m *Theme) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this theme based on context it is used

func (*Theme) MarshalBinary ¶

func (m *Theme) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Theme) UnmarshalBinary ¶

func (m *Theme) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Theme) Validate ¶

func (m *Theme) Validate(formats strfmt.Registry) error

Validate validates this theme

type Themes ¶

type Themes struct {

	// list of themes
	Themes []*Theme `json:"themes" yaml:"themes"`
}

Themes themes

swagger:model Themes

func (*Themes) ContextValidate ¶

func (m *Themes) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this themes based on the context it is used

func (*Themes) MarshalBinary ¶

func (m *Themes) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Themes) UnmarshalBinary ¶

func (m *Themes) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Themes) Validate ¶

func (m *Themes) Validate(formats strfmt.Registry) error

Validate validates this themes

type Token ¶

type Token struct {

	// index
	Index int64 `json:"Index,omitempty" yaml:"Index,omitempty"`

	// parent
	Parent *Element `json:"Parent,omitempty" yaml:"Parent,omitempty"`
}

Token A Token is an interface type used to represent XML elements, character data, CDATA sections, XML comments, XML directives, and XML processing instructions.

swagger:model Token

func (*Token) ContextValidate ¶

func (m *Token) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this token based on the context it is used

func (*Token) MarshalBinary ¶

func (m *Token) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Token) UnmarshalBinary ¶

func (m *Token) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Token) Validate ¶

func (m *Token) Validate(formats strfmt.Registry) error

Validate validates this token

type TokenTTLs ¶

type TokenTTLs struct {

	// Access token time to live
	//
	// After an access token reaches its time to live, it expires and it cannot be used to
	// authenticate the client application.
	// Example: 1h10m30s
	// Format: duration
	AccessTokenTTL strfmt.Duration `json:"access_token_ttl,omitempty" yaml:"access_token_ttl,omitempty"`

	// Authorization code time to live
	//
	// After an authorization code reaches its time to live, it expires and it cannot be used to
	// authorize the request to the `/token` endpoint.
	// Example: 10m0s
	// Format: duration
	AuthorizationCodeTTL strfmt.Duration `json:"authorization_code_ttl,omitempty" yaml:"authorization_code_ttl,omitempty"`

	// ID token time to live
	//
	// After an ID token reaches its time to live, it expires and it cannot be used to provide
	// user profile information to a client application.
	// Example: 1h10m30s
	// Format: duration
	IDTokenTTL strfmt.Duration `json:"id_token_ttl,omitempty" yaml:"id_token_ttl,omitempty"`

	// Refresh token time to live
	//
	// After a refresh token reaches its time to live, it expires and it cannot be used to obtain
	// new access tokens for a client application.
	// Example: 720h0m0s
	// Format: duration
	RefreshTokenTTL strfmt.Duration `json:"refresh_token_ttl,omitempty" yaml:"refresh_token_ttl,omitempty"`
}

TokenTTLs token t t ls

swagger:model TokenTTLs

func (*TokenTTLs) ContextValidate ¶

func (m *TokenTTLs) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this token t t ls based on context it is used

func (*TokenTTLs) MarshalBinary ¶

func (m *TokenTTLs) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TokenTTLs) UnmarshalBinary ¶

func (m *TokenTTLs) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TokenTTLs) Validate ¶

func (m *TokenTTLs) Validate(formats strfmt.Registry) error

Validate validates this token t t ls

type TokensRevokedPayload ¶

type TokensRevokedPayload struct {

	// consent ID for which the token has been revoked (populated only if type equals consent)
	ConsentID string `json:"consent_id,omitempty" yaml:"consent_id,omitempty"`

	// entity type for which token has been revoked
	// Example: consent
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

TokensRevokedPayload tokens revoked payload

swagger:model TokensRevokedPayload

func (*TokensRevokedPayload) ContextValidate ¶

func (m *TokensRevokedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this tokens revoked payload based on context it is used

func (*TokensRevokedPayload) MarshalBinary ¶

func (m *TokensRevokedPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TokensRevokedPayload) UnmarshalBinary ¶

func (m *TokensRevokedPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TokensRevokedPayload) Validate ¶

func (m *TokensRevokedPayload) Validate(formats strfmt.Registry) error

Validate validates this tokens revoked payload

type TrustAnchorConfiguration ¶

type TrustAnchorConfiguration struct {

	// jwks
	Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"`

	// URI of the JWKs of the trusted party responsible for signing the Software Statement
	JwksURI string `json:"jwks_uri,omitempty" yaml:"jwks_uri,omitempty"`
}

TrustAnchorConfiguration trust anchor configuration

swagger:model TrustAnchorConfiguration

func (*TrustAnchorConfiguration) ContextValidate ¶

func (m *TrustAnchorConfiguration) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this trust anchor configuration based on the context it is used

func (*TrustAnchorConfiguration) MarshalBinary ¶

func (m *TrustAnchorConfiguration) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*TrustAnchorConfiguration) UnmarshalBinary ¶

func (m *TrustAnchorConfiguration) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*TrustAnchorConfiguration) Validate ¶

func (m *TrustAnchorConfiguration) Validate(formats strfmt.Registry) error

Validate validates this trust anchor configuration

type UKConsentPayload ¶

type UKConsentPayload struct {

	// account ids
	AccountIds []string `json:"account_ids" yaml:"account_ids"`

	// Client application identifier.
	// Example: \"cauqo9c9vpbs0aj2b2v0\
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// consent id
	ConsentID string `json:"consent_id,omitempty" yaml:"consent_id,omitempty"`

	// created at
	// Format: date-time
	CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"`

	// idempotency key
	IdempotencyKey string `json:"idempotency_key,omitempty" yaml:"idempotency_key,omitempty"`

	// request hash
	RequestHash string `json:"request_hash,omitempty" yaml:"request_hash,omitempty"`

	// Server / Workspace identifier.
	// Example: \"server\
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// spec
	Spec string `json:"spec,omitempty" yaml:"spec,omitempty"`

	// spec version
	SpecVersion SpecVersion `json:"spec_version,omitempty" yaml:"spec_version,omitempty"`

	// status
	Status string `json:"status,omitempty" yaml:"status,omitempty"`

	// Tenant identifier.
	// Example: \"tenant\
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	Type ConsentType `json:"type,omitempty" yaml:"type,omitempty"`
}

UKConsentPayload u k consent payload

swagger:model UKConsentPayload

func (*UKConsentPayload) ContextValidate ¶

func (m *UKConsentPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this u k consent payload based on the context it is used

func (*UKConsentPayload) MarshalBinary ¶

func (m *UKConsentPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*UKConsentPayload) UnmarshalBinary ¶

func (m *UKConsentPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*UKConsentPayload) Validate ¶

func (m *UKConsentPayload) Validate(formats strfmt.Registry) error

Validate validates this u k consent payload

type UnbindSystemAPIRequest ¶

type UnbindSystemAPIRequest struct {

	// api id
	APIID string `json:"api_id,omitempty" yaml:"api_id,omitempty"`

	// policy id
	PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"`

	// policy server id
	PolicyServerID string `json:"policy_server_id,omitempty" yaml:"policy_server_id,omitempty"`
}

UnbindSystemAPIRequest unbind system API request

swagger:model UnbindSystemAPIRequest

func (*UnbindSystemAPIRequest) ContextValidate ¶

func (m *UnbindSystemAPIRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this unbind system API request based on context it is used

func (*UnbindSystemAPIRequest) MarshalBinary ¶

func (m *UnbindSystemAPIRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*UnbindSystemAPIRequest) UnmarshalBinary ¶

func (m *UnbindSystemAPIRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*UnbindSystemAPIRequest) Validate ¶

func (m *UnbindSystemAPIRequest) Validate(formats strfmt.Registry) error

Validate validates this unbind system API request

type UpdateAPIRequest ¶

type UpdateAPIRequest struct {

	// Data classifications
	DataClassifications []string `json:"data_classifications" yaml:"data_classifications"`

	// optional graphql schema
	GraphqlSchema string `json:"graphql_schema,omitempty" yaml:"graphql_schema,omitempty"`

	// graphql types
	GraphqlTypes GraphQLTypes `json:"graphql_types,omitempty" yaml:"graphql_types,omitempty"`

	// optional id of a policy
	// Example: block
	PolicyID string `json:"policy_id,omitempty" yaml:"policy_id,omitempty"`
}

UpdateAPIRequest update API request

swagger:model UpdateAPIRequest

func (*UpdateAPIRequest) ContextValidate ¶

func (m *UpdateAPIRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this update API request based on the context it is used

func (*UpdateAPIRequest) MarshalBinary ¶

func (m *UpdateAPIRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*UpdateAPIRequest) UnmarshalBinary ¶

func (m *UpdateAPIRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*UpdateAPIRequest) Validate ¶

func (m *UpdateAPIRequest) Validate(formats strfmt.Registry) error

Validate validates this update API request

type UpdateClientAdminRequest ¶

type UpdateClientAdminRequest struct {

	// The client application type.
	//
	// Client applications can be either of a `web` or `native` types.
	//
	// Web applications include clients like server web applications or service apps.
	//
	// Native applications include single-page applications (SPAs) and mobile or desktop
	// applications.
	//
	// Apply security measures according to the type of your application.
	// Example: web
	ApplicationType string `json:"application_type,omitempty" yaml:"application_type,omitempty"`

	// An array of dynamically calculated application types that can be used for filtering
	// Example: ["single_page","server_web","mobile_desktop","service","legacy","dcr"]
	// Read Only: true
	ApplicationTypes []string `json:"application_types" yaml:"application_types"`

	// Identity of the intended recipients (the audience).
	//
	// Typically, the audience is a single resource server or a list of resource servers.
	//
	// It is considered a good practice to limit the audience of the token for security purposes.
	Audience []string `json:"audience" yaml:"audience"`

	// Authorization details types
	//
	// Indicates what authorization details types the client can use.
	AuthorizationDetailsTypes []AuthorizationDetailType `json:"authorization_details_types" yaml:"authorization_details_types"`

	// Algorithm used for encrypting authorization responses.
	//
	// If both signing and encryption are requested, the response is first signed, and then encrypted.
	// As a result, a Nested JWT is obtained, as defined in JWT [RFC7519].
	//
	// If omitted, no encryption is applied by default.
	// Example: RSA-OAEP-256
	// Enum: [RSA-OAEP RSA-OAEP-256]
	AuthorizationEncryptedResponseAlg string `json:"authorization_encrypted_response_alg,omitempty" yaml:"authorization_encrypted_response_alg,omitempty"`

	// Algorithm used for encrypting authorization responses.
	//
	// With `authorization_encrypted_response_alg` specified, the default value is `A128CBC-HS256`.
	// When `authorization_encrypted_response_enc` is included, `authorization_encrypted_response_alg`
	// MUST also be provided in a request.
	// Example: A128CBC-HS256
	// Enum: [A256GCM A128CBC-HS256]
	AuthorizationEncryptedResponseEnc string `json:"authorization_encrypted_response_enc,omitempty" yaml:"authorization_encrypted_response_enc,omitempty"`

	// An authorization server (workspace) identifier holding the client application.
	// Example: default
	// Required: true
	AuthorizationServerID string `json:"authorization_server_id" yaml:"authorization_server_id"`

	// Algorithm used for signing authorization responses.
	//
	// With this parameter specified, the response is signed using JWS and according to the configured algorithm.
	//
	// `none` isn't allowed.
	// Example: RS256
	AuthorizationSignedResponseAlg string `json:"authorization_signed_response_alg,omitempty" yaml:"authorization_signed_response_alg,omitempty"`

	// OPTIONAL. The JWS alg algorithm value used by the client application to sign authentication requests.
	//
	// When omitted, the client application doesn't send signed authentication requests.
	BackchannelAuthenticationRequestSigningAlg string `` /* 127-byte string literal not displayed */

	// REQUIRED for requests when the client application uses CIBA as an authorization grant type, and the token
	// delivery mode is set to `ping` or `push`.
	//
	// This parameter is the endpoint where an OP (OpenID Provider) posts a notification after end-user authentication.
	//
	// Input: an HTTPS URL.
	BackchannelClientNotificationEndpoint string `json:"backchannel_client_notification_endpoint,omitempty" yaml:"backchannel_client_notification_endpoint,omitempty"`

	// REQUIRED for requests when the client application uses CIBA as an authorization grant type.
	//
	// Input: `poll`, `ping`, or `push`.
	BackchannelTokenDeliveryMode string `json:"backchannel_token_delivery_mode,omitempty" yaml:"backchannel_token_delivery_mode,omitempty"`

	// OPTIONAL. A boolean value indicating the `user_code` parameter support by the client application.
	//
	// If omitted, the default value is `false`.
	//
	// This applies only when the `backchannel_user_code_parameter_supported` OP parameter is `true`.
	BackchannelUserCodeParameter bool `json:"backchannel_user_code_parameter,omitempty" yaml:"backchannel_user_code_parameter,omitempty"`

	// OAuth client application identifier
	//
	// If not provided, a random client ID is generated.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// The client identifier time of issue.
	//
	// The value is the number of seconds between 1970-01-01T00:00:00Z (UTC) and the date/time of issue.
	ClientIDIssuedAt int64 `json:"client_id_issued_at,omitempty" yaml:"client_id_issued_at,omitempty"`

	// Human-readable name of a client application.
	// Example: My app
	ClientName string `json:"client_name,omitempty" yaml:"client_name,omitempty"`

	// OAuth client secret
	//
	// If not provided, a random client secret is generated.
	// Min Length: 32
	ClientSecret string `json:"client_secret,omitempty" yaml:"client_secret,omitempty"`

	// The client secret expiration time.
	//
	// If the client secret does not expire, `client_secret_expires_at` = `0`.
	ClientSecretExpiresAt int64 `json:"client_secret_expires_at,omitempty" yaml:"client_secret_expires_at,omitempty"`

	// Defines whether the client application is active or not.
	//
	// Only clients with the `Active` status can preform authorization, authentication, and PAR requests.
	// Enum: [active inactive]
	ClientStatus string `json:"client_status,omitempty" yaml:"client_status,omitempty"`

	// client type
	// Enum: [oauth2 saml]
	ClientType string `json:"client_type,omitempty" yaml:"client_type,omitempty"`

	// URI of a client application.
	ClientURI string `json:"client_uri,omitempty" yaml:"client_uri,omitempty"`

	// Date when the client application was created.
	// Example: 2022-04-07T19:17:31.323187Z
	// Format: date-time
	CreatedAt strfmt.DateTime `json:"created_at,omitempty" yaml:"created_at,omitempty"`

	// Description of the client application.
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Optional developer owner of the client application.
	DeveloperID string `json:"developer_id,omitempty" yaml:"developer_id,omitempty"`

	// developer metadata
	DeveloperMetadata Metadata `json:"developer_metadata,omitempty" yaml:"developer_metadata,omitempty"`

	// Boolean value specifying whether the client always uses DPoP for token requests
	// If true, the authorization server will reject token requests from this client that do not contain the DPoP header.
	DpopBoundAccessTokens bool `json:"dpop_bound_access_tokens,omitempty" yaml:"dpop_bound_access_tokens,omitempty"`

	// fdx
	Fdx *FDXMetadata `json:"fdx,omitempty" yaml:"fdx,omitempty"`

	// An array of allowed OAuth client grant types.
	//
	// The `grantTypes` array stores OAuth flows that are allowed for a given client application.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-grant-types/grant-types-overview/) about grant types.
	// Example: ["password","refresh_token","client_credentials","implicit","authorization_code"]
	GrantTypes []string `json:"grant_types" yaml:"grant_types"`

	// An array of hashed rotated client secrets
	HashedRotatedSecrets []string `json:"hashed_rotated_secrets" yaml:"hashed_rotated_secrets"`

	// Hashed client secret
	//
	// Hashing client secrets provides additional security for your secrets storage as it hides
	// plaintext secrets from being viewed both in the UI and the database.
	HashedSecret string `json:"hashed_secret,omitempty" yaml:"hashed_secret,omitempty"`

	// JWE alg algorithm for encrypting the ID token issued to this client application.
	// Enum: [RSA-OAEP RSA-OAEP-256]
	IDTokenEncryptedResponseAlg string `json:"id_token_encrypted_response_alg,omitempty" yaml:"id_token_encrypted_response_alg,omitempty"`

	// JWE enc algorithm for encrypting the ID token issued to this client application.
	// Enum: [A256GCM A128CBC-HS256]
	IDTokenEncryptedResponseEnc string `json:"id_token_encrypted_response_enc,omitempty" yaml:"id_token_encrypted_response_enc,omitempty"`

	// Algorithm for signing ID tokens issued for a client application.
	//
	// The default value depends on authorization server configuration.
	// Example: ES256
	// Enum: [RS256 ES256 PS256]
	IDTokenSignedResponseAlg string `json:"id_token_signed_response_alg,omitempty" yaml:"id_token_signed_response_alg,omitempty"`

	// An introspection endpoint authentication method configured for the client application (read-only).
	//
	// If empty, the `token_endpoint_auth_method` is used.
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	IntrospectionEndpointAuthMethod string `json:"introspection_endpoint_auth_method,omitempty" yaml:"introspection_endpoint_auth_method,omitempty"`

	// jwks
	Jwks *ClientJWKs `json:"jwks,omitempty" yaml:"jwks,omitempty"`

	// A URL of JSON Web Key Set with the public keys used by a client application to authenticate to Cloudentity.
	JwksURI string `json:"jwks_uri,omitempty" yaml:"jwks_uri,omitempty"`

	// Logo URI.
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// metadata
	Metadata Metadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// External organization identifier. It is a unique string assigned by the CDR Register to identify an Accredited
	// Data Recipient Brand.
	//
	// The value obtained is used as the `aud` claim for message signing, for example, when a JSON Web Token (JWT) is
	// required for authorization, and represents the audience(s) the JWT is intended for.
	// Example: 5647fe90-f6bc-11eb-9a03-0242ac130003
	OrganisationID string `json:"organisation_id,omitempty" yaml:"organisation_id,omitempty"`

	// Policy URL to read about how the profile data is used.
	PolicyURI string `json:"policy_uri,omitempty" yaml:"policy_uri,omitempty"`

	// Array of URLs to which a relying party may request that the user be redirected after a logout has been performed.
	PostLogoutRedirectUris []string `json:"post_logout_redirect_uris" yaml:"post_logout_redirect_uris"`

	// privacy
	Privacy *ClientPrivacy `json:"privacy,omitempty" yaml:"privacy,omitempty"`

	// redirect uris
	RedirectUris RedirectURIs `json:"redirect_uris,omitempty" yaml:"redirect_uris,omitempty"`

	// Optional JWE alg algorithm the client is declaring that it may use for encrypting Request Objects
	// Example: RSA-OAEP
	// Enum: [RSA-OAEP RSA-OAEP-256]
	RequestObjectEncryptionAlg string `json:"request_object_encryption_alg,omitempty" yaml:"request_object_encryption_alg,omitempty"`

	// Optional JWE enc algorithm the client is declaring that it may use for encrypting Request Objects
	// When `request_object_encryption_enc` is included, `request_object_encryption_alg` MUST also be provided.
	// Example: A256GCM
	// Enum: [A256GCM A128CBC-HS256]
	RequestObjectEncryptionEnc string `json:"request_object_encryption_enc,omitempty" yaml:"request_object_encryption_enc,omitempty"`

	// Request object signing algorithm for the token endpoint
	//
	// Cloudentity supports signing tokens with the RS256, ES256, and PS256 algorithms. If you do not want
	// to use a signing algorithm, set the value of this parameter to `none`.
	// Example: none
	// Enum: [any none RS256 ES256 PS256]
	RequestObjectSigningAlg string `json:"request_object_signing_alg,omitempty" yaml:"request_object_signing_alg,omitempty"`

	// Array of absolute URIs that points to the Request Object that holds authorization request parameters.
	RequestUris []string `json:"request_uris" yaml:"request_uris"`

	// Boolean parameter indicating whether the only means of initiating an authorization request the client is allowed to use is PAR.
	RequirePushedAuthorizationRequests bool `json:"require_pushed_authorization_requests,omitempty" yaml:"require_pushed_authorization_requests,omitempty"`

	// response types
	ResponseTypes ResponseTypes `json:"response_types,omitempty" yaml:"response_types,omitempty"`

	// A revocation endpoint authentication method configured for the client application (read-only).
	// If empty, the `token_endpoint_auth_method` is used.
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// [Read more](https://cloudentity.com/developers/basics/oauth-client-authentication/client-authentication-overview/) about client authentication.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	RevocationEndpointAuthMethod string `json:"revocation_endpoint_auth_method,omitempty" yaml:"revocation_endpoint_auth_method,omitempty"`

	// An array of rotated OAuth client secrets
	RotatedSecrets []string `json:"rotated_secrets" yaml:"rotated_secrets"`

	// saml metadata
	SamlMetadata *EntityDescriptor `json:"saml_metadata,omitempty" yaml:"saml_metadata,omitempty"`

	// saml service provider id
	SamlServiceProviderID string `json:"saml_service_provider_id,omitempty" yaml:"saml_service_provider_id,omitempty"`

	// Space-separated list of scopes for compatibility with the OAuth specification.
	// Example: email offline_access openid
	Scope string `json:"scope,omitempty" yaml:"scope,omitempty"`

	// An array of string represented scopes assigned to a client application
	// Example: ["email","offline_access","openid"]
	Scopes []string `json:"scopes" yaml:"scopes"`

	// OPTIONAL. [A URL using the HTTPS scheme](https://openid.net/specs/openid-connect-registration-1_0.html#SectorIdentifierValidation).
	// It must reference a JSON file with the array of `redirect_uri` values.
	//
	// Pass this parameter when you use multiple domains in your `redirect_uris` or need a mechanism to allow changes in
	// domain without affecting consumer consent.
	//
	// [Read more](https://openid.net/specs/openid-connect-core-1_0.html)
	SectorIdentifierURI string `json:"sector_identifier_uri,omitempty" yaml:"sector_identifier_uri,omitempty"`

	// A digitally signed or MACed JSON Web Token (JWT) [RFC7519] that
	// asserts metadata values about the client software.  In some cases,
	// a software statement is issued directly by the client
	// developer.  In other cases, a software statement is issued by
	// a third-party organization for use by the client developer.
	//
	// In both cases, the trust relationship the authorization server has
	// with the issuer of the software statement is intended to be used
	// as an input to the evaluation of whether the registration request
	// is accepted.
	//
	// A software statement can be presented to an
	// authorization server as part of the client registration request.
	SoftwareStatement string `json:"software_statement,omitempty" yaml:"software_statement,omitempty"`

	// software statement payload
	SoftwareStatementPayload Metadata `json:"software_statement_payload,omitempty" yaml:"software_statement_payload,omitempty"`

	// Subject identifier type
	//
	// Stores information if the subject identifier is of the `public` or the `pairwise` type.
	//
	// Subject identifiers identify an end-user. They are locally unique and never reassigned within the Issuer,
	// and are intended to be consumed by client applications. There are two types
	// of subject identifiers: `public` and `pairwise`.
	//
	// For the `public` type, the value of the `sub` (subject) token claim is the same for all clients.
	//
	// For the `pairwise` type, a different `sub` (subject) token claim is provided for each client.
	// Using the `pairwise` subject identifier makes it impossible for client applications to correlate the end-user's
	// activity without their permission.
	// Example: public
	// Enum: [public pairwise]
	SubjectType string `json:"subject_type,omitempty" yaml:"subject_type,omitempty"`

	// Defines whether the client application is a system tenant's application or not.
	System bool `json:"system,omitempty" yaml:"system,omitempty"`

	// ID of a tenant where the client application is added
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// A string containing the value of an expected dNSName SAN entry in the certificate.
	TLSClientAuthSanDNS string `json:"tls_client_auth_san_dns,omitempty" yaml:"tls_client_auth_san_dns,omitempty"`

	// A string containing the value of an expected rfc822Name SAN entry in the certificate.
	TLSClientAuthSanEmail string `json:"tls_client_auth_san_email,omitempty" yaml:"tls_client_auth_san_email,omitempty"`

	// A string representation of an IP address in either dotted decimal notation (for IPv4) or colon-delimited hexadecimal (for IPv6, as defined in [RFC5952]) that is expected to be present as an iPAddress SAN entry in the certificate.
	TLSClientAuthSanIP string `json:"tls_client_auth_san_ip,omitempty" yaml:"tls_client_auth_san_ip,omitempty"`

	// A string containing the value of an expected uniformResourceIdentifier SAN entry in the certificate.
	TLSClientAuthSanURI string `json:"tls_client_auth_san_uri,omitempty" yaml:"tls_client_auth_san_uri,omitempty"`

	// An [RFC4514] string representation of the expected subject distinguished name of the certificate.
	TLSClientAuthSubjectDn string `json:"tls_client_auth_subject_dn,omitempty" yaml:"tls_client_auth_subject_dn,omitempty"`

	// Boolean value indicating server support for mutual TLS client certificate-bound access tokens. If omitted, the default value is "false".
	TLSClientCertificateBoundAccessTokens bool `json:"tls_client_certificate_bound_access_tokens,omitempty" yaml:"tls_client_certificate_bound_access_tokens,omitempty"`

	// Token endpoint authentication method configured for a client application
	//
	// Cloudentity supports the following client authentication methods:
	// `client_secret_basic`, `client_secret_post`, `client_secret_jwt`, `private_key_jwt`,
	// `self_signed_tls_client_auth`, `tls_client_auth`, `none`.
	//
	// To learn more, go to the Authorization Basics > Client Authentication section of this guide.
	// Example: client_secret_basic
	// Enum: [client_secret_basic client_secret_post client_secret_jwt private_key_jwt self_signed_tls_client_auth tls_client_auth none]
	TokenEndpointAuthMethod string `json:"token_endpoint_auth_method,omitempty" yaml:"token_endpoint_auth_method,omitempty"`

	// Signing algorithm for the token endpoint
	//
	// This field is optional. If empty, a client can use any algorithm supported by the server (see `token_endpoint_auth_signing_alg_values_supported` in the well-known endpoing).
	//
	// If provided, depending on the server configuration, client can use of one: HS256, RS256, ES256, PS256 algorithms.
	//
	// If your token endpoint authentication is set to the `private_key_jwt` method, the
	// `token_endpoint_auth_signing_alg` parameter must be either RS256, ES256, or PS256.
	//
	// If your token endpoint authentication is set to the `client_secret_jwt` method,
	// the `token_endpoint_auth_signing_alg` parameter must be HS256.
	// Example: ES256
	// Enum: [RS256 ES256 PS256 HS256 ]
	TokenEndpointAuthSigningAlg string `json:"token_endpoint_auth_signing_alg,omitempty" yaml:"token_endpoint_auth_signing_alg,omitempty"`

	// token exchange
	TokenExchange *ClientTokenExchangeConfiguration `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"`

	// token ttls
	TokenTtls *TokenTTLs `json:"token_ttls,omitempty" yaml:"token_ttls,omitempty"`

	// Terms of Service URL.
	TosURI string `json:"tos_uri,omitempty" yaml:"tos_uri,omitempty"`

	// Defines whether the client application is trusted or not.
	//
	// For trusted clients, consent pages are skipped during the authorization process.
	Trusted bool `json:"trusted,omitempty" yaml:"trusted,omitempty"`

	// Date when the client application was updated.
	// Example: 2022-05-08T01:11:51.1262916Z
	// Format: date-time
	UpdatedAt strfmt.DateTime `json:"updated_at,omitempty" yaml:"updated_at,omitempty"`

	// If enabled the client application will be able to set its own token TTLs.
	UseCustomTokenTtls bool `json:"use_custom_token_ttls,omitempty" yaml:"use_custom_token_ttls,omitempty"`

	// JWS alg algorithm REQUIRED for signing UserInfo Responses.
	//
	// If specified, the response is a JWT serialized and signed with JWS.
	//
	// If omitted, then by default, UserInfo Response returns the Claims
	// as an UTF-8 encoded JSON object using the application/json content-type.
	// Example: none
	// Enum: [none RS256 ES256]
	UserinfoSignedResponseAlg string `json:"userinfo_signed_response_alg,omitempty" yaml:"userinfo_signed_response_alg,omitempty"`
}

UpdateClientAdminRequest update client admin request

swagger:model UpdateClientAdminRequest

func (*UpdateClientAdminRequest) ContextValidate ¶

func (m *UpdateClientAdminRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this update client admin request based on the context it is used

func (*UpdateClientAdminRequest) MarshalBinary ¶

func (m *UpdateClientAdminRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*UpdateClientAdminRequest) UnmarshalBinary ¶

func (m *UpdateClientAdminRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*UpdateClientAdminRequest) Validate ¶

func (m *UpdateClientAdminRequest) Validate(formats strfmt.Registry) error

Validate validates this update client admin request

type UpdateGatewayRequest ¶

type UpdateGatewayRequest struct {

	// description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// gateway name
	// Example: Cloudentity Pyron
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// token exchange
	TokenExchange *GatewayTokenExchangeSettings `json:"token_exchange,omitempty" yaml:"token_exchange,omitempty"`
}

UpdateGatewayRequest update gateway request

swagger:model UpdateGatewayRequest

func (*UpdateGatewayRequest) ContextValidate ¶

func (m *UpdateGatewayRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this update gateway request based on the context it is used

func (*UpdateGatewayRequest) MarshalBinary ¶

func (m *UpdateGatewayRequest) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*UpdateGatewayRequest) UnmarshalBinary ¶

func (m *UpdateGatewayRequest) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*UpdateGatewayRequest) Validate ¶

func (m *UpdateGatewayRequest) Validate(formats strfmt.Registry) error

Validate validates this update gateway request

type UserAttributeMapping ¶

type UserAttributeMapping struct {

	// If enabled, the decoder makes the following "weak" conversions:
	//
	// Bools to string (true = "1", false = "0")
	//
	// numbers to string (base 10)
	//
	// bools to int/uint (true = 1, false = 0)
	//
	// strings to int/uint (base implied by prefix)
	//
	// int to bool (true if value != 0)
	//
	// string to bool (accepts only the following: 1, t, T, TRUE, true, True, 0, f, F, FALSE, false, False)
	//
	// empty array = empty map and vice versa
	//
	// negative numbers to overflowed uint values (base 10)
	//
	// slice of maps to a merged map
	//
	// single values are converted to slices if required. Each element is weakly decoded.
	// Example: false
	AllowWeakDecoding bool `json:"allow_weak_decoding,omitempty" yaml:"allow_weak_decoding,omitempty"`

	// mode
	Mode MappingMode `json:"mode,omitempty" yaml:"mode,omitempty"`

	// Source attribute.
	//
	// Source path to the attribute(s) which should be copied to the authentication context.
	// Use '.' to copy everything.
	// Required for dynamic mode.
	// Example: access_token
	Source string `json:"source,omitempty" yaml:"source,omitempty"`

	// When static mode is used, this field contains a value that will be populated into a target attribute.
	Static interface{} `json:"static,omitempty" yaml:"static,omitempty"`

	// Target attribute.
	//
	// Target path in the authentication context where source attribute(s) should be pasted.
	// Use '.' to paste to the context top level object.
	// Example: .
	// Required: true
	Target string `json:"target" yaml:"target"`

	// Type of the target attribute
	//
	// The `type` parameter accepts the following values:
	// `number`, `string`, `bool`, `number_array`, `string_array`, `bool_array`, `any`.
	// Example: string
	// Required: true
	Type string `json:"type" yaml:"type"`

	// update on sign in
	UpdateOnSignIn bool `json:"update_on_sign_in,omitempty" yaml:"update_on_sign_in,omitempty"`
}

UserAttributeMapping user attribute mapping

swagger:model UserAttributeMapping

func (*UserAttributeMapping) ContextValidate ¶

func (m *UserAttributeMapping) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this user attribute mapping based on the context it is used

func (*UserAttributeMapping) MarshalBinary ¶

func (m *UserAttributeMapping) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*UserAttributeMapping) UnmarshalBinary ¶

func (m *UserAttributeMapping) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*UserAttributeMapping) Validate ¶

func (m *UserAttributeMapping) Validate(formats strfmt.Registry) error

Validate validates this user attribute mapping

type UserAttributesMapping ¶

type UserAttributesMapping []*UserAttributeMapping

UserAttributesMapping user attributes mapping

swagger:model UserAttributesMapping

func (UserAttributesMapping) ContextValidate ¶

func (m UserAttributesMapping) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this user attributes mapping based on the context it is used

func (UserAttributesMapping) Validate ¶

func (m UserAttributesMapping) Validate(formats strfmt.Registry) error

Validate validates this user attributes mapping

type UserAuthenticatedPayload ¶

type UserAuthenticatedPayload struct {

	// identifier
	Identifier string `json:"identifier,omitempty" yaml:"identifier,omitempty"`

	// password mode
	PasswordMode bool `json:"password_mode,omitempty" yaml:"password_mode,omitempty"`

	// success
	// Required: true
	Success bool `json:"success" yaml:"success"`
}

UserAuthenticatedPayload UserAuthenticatedPayload user authenticated payload

swagger:model UserAuthenticatedPayload

func (*UserAuthenticatedPayload) ContextValidate ¶

func (m *UserAuthenticatedPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this user authenticated payload based on context it is used

func (*UserAuthenticatedPayload) MarshalBinary ¶

func (m *UserAuthenticatedPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*UserAuthenticatedPayload) UnmarshalBinary ¶

func (m *UserAuthenticatedPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*UserAuthenticatedPayload) Validate ¶

func (m *UserAuthenticatedPayload) Validate(formats strfmt.Registry) error

Validate validates this user authenticated payload

type UserCodeCharacterSet ¶

type UserCodeCharacterSet string

UserCodeCharacterSet user code character set

swagger:model UserCodeCharacterSet

func (UserCodeCharacterSet) ContextValidate ¶

func (m UserCodeCharacterSet) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this user code character set based on context it is used

func (UserCodeCharacterSet) Validate ¶

func (m UserCodeCharacterSet) Validate(formats strfmt.Registry) error

Validate validates this user code character set

type UserOrganizationsResponse ¶

type UserOrganizationsResponse struct {

	// cursor
	Cursor Cursor `json:"cursor,omitempty" yaml:"cursor,omitempty"`

	// organizations
	Organizations []*OrganizationResponse `json:"organizations" yaml:"organizations"`
}

UserOrganizationsResponse user organizations response

swagger:model UserOrganizationsResponse

func (*UserOrganizationsResponse) ContextValidate ¶

func (m *UserOrganizationsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this user organizations response based on the context it is used

func (*UserOrganizationsResponse) MarshalBinary ¶

func (m *UserOrganizationsResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*UserOrganizationsResponse) UnmarshalBinary ¶

func (m *UserOrganizationsResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*UserOrganizationsResponse) Validate ¶

func (m *UserOrganizationsResponse) Validate(formats strfmt.Registry) error

Validate validates this user organizations response

type UserPayload ¶

type UserPayload struct {

	// address
	Address string `json:"address,omitempty" yaml:"address,omitempty"`

	// identifier
	Identifier string `json:"identifier,omitempty" yaml:"identifier,omitempty"`

	// identifiers
	Identifiers []string `json:"identifiers" yaml:"identifiers"`

	// payload
	Payload map[string]interface{} `json:"payload,omitempty" yaml:"payload,omitempty"`

	// status
	// Enum: [active inactive deleted new]
	Status string `json:"status,omitempty" yaml:"status,omitempty"`

	// user update details
	UpdateDetails string `json:"update_details,omitempty" yaml:"update_details,omitempty"`

	// user addresses
	UserAddresses []*EventAddress `json:"user_addresses" yaml:"user_addresses"`

	// user ID
	UserID string `json:"user_id,omitempty" yaml:"user_id,omitempty"`

	// user identifiers
	UserIdentifiers []*EventIdentifier `json:"user_identifiers" yaml:"user_identifiers"`
}

UserPayload UserPayload user payload

swagger:model UserPayload

func (*UserPayload) ContextValidate ¶

func (m *UserPayload) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this user payload based on the context it is used

func (*UserPayload) MarshalBinary ¶

func (m *UserPayload) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*UserPayload) UnmarshalBinary ¶

func (m *UserPayload) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*UserPayload) Validate ¶

func (m *UserPayload) Validate(formats strfmt.Registry) error

Validate validates this user payload

type UserWorkspacesResponse ¶

type UserWorkspacesResponse struct {

	// cursor
	Cursor Cursor `json:"cursor,omitempty" yaml:"cursor,omitempty"`

	// workspaces
	Workspaces []*WorkspaceResponse `json:"workspaces" yaml:"workspaces"`
}

UserWorkspacesResponse user workspaces response

swagger:model UserWorkspacesResponse

func (*UserWorkspacesResponse) ContextValidate ¶

func (m *UserWorkspacesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this user workspaces response based on the context it is used

func (*UserWorkspacesResponse) MarshalBinary ¶

func (m *UserWorkspacesResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*UserWorkspacesResponse) UnmarshalBinary ¶

func (m *UserWorkspacesResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*UserWorkspacesResponse) Validate ¶

func (m *UserWorkspacesResponse) Validate(formats strfmt.Registry) error

Validate validates this user workspaces response

type ValidateResponseValidatorFailure ¶

type ValidateResponseValidatorFailure struct {

	// details
	Details string `json:"details,omitempty" yaml:"details,omitempty"`

	// message
	Message string `json:"message,omitempty" yaml:"message,omitempty"`

	// validator
	Validator string `json:"validator,omitempty" yaml:"validator,omitempty"`
}

ValidateResponseValidatorFailure validate response validator failure

swagger:model ValidateResponse_ValidatorFailure

func (*ValidateResponseValidatorFailure) ContextValidate ¶

func (m *ValidateResponseValidatorFailure) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this validate response validator failure based on context it is used

func (*ValidateResponseValidatorFailure) MarshalBinary ¶

func (m *ValidateResponseValidatorFailure) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ValidateResponseValidatorFailure) UnmarshalBinary ¶

func (m *ValidateResponseValidatorFailure) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ValidateResponseValidatorFailure) Validate ¶

Validate validates this validate response validator failure

type ValidatorConfig ¶

type ValidatorConfig struct {

	// Configuration of the validator provided in the JSON format
	//
	// Validators configuration is an array of fields where each node consists of a comparator used,
	// validated field, and a value for comparison. Configuration can be also branched, which means
	// that it is possible to create conditional validators. It allows to define complex
	// authorization scenarios based on the results from other policy validators.
	Conf map[string]interface{} `json:"conf,omitempty" yaml:"conf,omitempty"`

	// The name of your validator
	// Example: identity-context
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// recovery
	Recovery []*RecoveryConfig `json:"recovery" yaml:"recovery"`
}

ValidatorConfig Configuration of a policy validator

Depending on the type of a policy different validators are available.

swagger:model ValidatorConfig

func (*ValidatorConfig) ContextValidate ¶

func (m *ValidatorConfig) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this validator config based on the context it is used

func (*ValidatorConfig) MarshalBinary ¶

func (m *ValidatorConfig) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*ValidatorConfig) UnmarshalBinary ¶

func (m *ValidatorConfig) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*ValidatorConfig) Validate ¶

func (m *ValidatorConfig) Validate(formats strfmt.Registry) error

Validate validates this validator config

type VanityDomain ¶

type VanityDomain struct {

	// api key
	APIKey string `json:"api_key,omitempty" yaml:"api_key,omitempty"`

	// base path to use with a configured vanity domain
	// Example: /prefix
	BasePath string `json:"base_path,omitempty" yaml:"base_path,omitempty"`

	// domain cerificate
	Cert string `json:"cert,omitempty" yaml:"cert,omitempty"`

	// vanity domain
	// Example: example.com
	// Required: true
	Domain string `json:"domain" yaml:"domain"`

	// ID
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// domain private key
	Key string `json:"key,omitempty" yaml:"key,omitempty"`

	// Unique identifier of an authorization server (workspace)
	// Example: default
	ServerID string `json:"server_id,omitempty" yaml:"server_id,omitempty"`

	// ID of a tenant
	// Example: default
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	Type VanityDomainType `json:"type,omitempty" yaml:"type,omitempty"`
}

VanityDomain vanity domain

swagger:model VanityDomain

func (*VanityDomain) ContextValidate ¶

func (m *VanityDomain) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this vanity domain based on the context it is used

func (*VanityDomain) MarshalBinary ¶

func (m *VanityDomain) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*VanityDomain) UnmarshalBinary ¶

func (m *VanityDomain) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*VanityDomain) Validate ¶

func (m *VanityDomain) Validate(formats strfmt.Registry) error

Validate validates this vanity domain

type VanityDomainType ¶

type VanityDomainType string

VanityDomainType vanity domain type

swagger:model VanityDomainType

func (VanityDomainType) ContextValidate ¶

func (m VanityDomainType) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this vanity domain type based on context it is used

func (VanityDomainType) Validate ¶

func (m VanityDomainType) Validate(formats strfmt.Registry) error

Validate validates this vanity domain type

type Webhook ¶

type Webhook struct {

	// Active
	Active bool `json:"active,omitempty" yaml:"active,omitempty"`

	// API Key
	APIKey string `json:"api_key,omitempty" yaml:"api_key,omitempty"`

	// events
	Events map[string][]string `json:"events,omitempty" yaml:"events,omitempty"`

	// Insecure
	Insecure bool `json:"insecure,omitempty" yaml:"insecure,omitempty"`

	// ID of the server
	// Required: true
	ServerID string `json:"server_id" yaml:"server_id"`

	// ID of the tenant
	// Example: default
	// Required: true
	TenantID string `json:"tenant_id" yaml:"tenant_id"`

	// url of the Webhook
	URL string `json:"url,omitempty" yaml:"url,omitempty"`

	// ID to the Webhook
	// Required: true
	WebhookID string `json:"webhook_id" yaml:"webhook_id"`
}

Webhook Custom Branding Webhook

swagger:model Webhook

func (*Webhook) ContextValidate ¶

func (m *Webhook) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this webhook based on context it is used

func (*Webhook) MarshalBinary ¶

func (m *Webhook) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*Webhook) UnmarshalBinary ¶

func (m *Webhook) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*Webhook) Validate ¶

func (m *Webhook) Validate(formats strfmt.Registry) error

Validate validates this webhook

type WebhookOnCreateResponse ¶

type WebhookOnCreateResponse struct {

	// Active
	Active bool `json:"active,omitempty" yaml:"active,omitempty"`

	// API Key
	APIKey string `json:"api_key,omitempty" yaml:"api_key,omitempty"`

	// events
	Events map[string][]string `json:"events,omitempty" yaml:"events,omitempty"`

	// Insecure
	Insecure bool `json:"insecure,omitempty" yaml:"insecure,omitempty"`

	// url of the Webhook
	URL string `json:"url,omitempty" yaml:"url,omitempty"`

	// ID to the Webhook
	WebhookID string `json:"webhook_id,omitempty" yaml:"webhook_id,omitempty"`
}

WebhookOnCreateResponse Wevhook object on create

swagger:model WebhookOnCreateResponse

func (*WebhookOnCreateResponse) ContextValidate ¶

func (m *WebhookOnCreateResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this webhook on create response based on context it is used

func (*WebhookOnCreateResponse) MarshalBinary ¶

func (m *WebhookOnCreateResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*WebhookOnCreateResponse) UnmarshalBinary ¶

func (m *WebhookOnCreateResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*WebhookOnCreateResponse) Validate ¶

func (m *WebhookOnCreateResponse) Validate(formats strfmt.Registry) error

Validate validates this webhook on create response

type WebhookResponse ¶

type WebhookResponse struct {

	// Active
	Active bool `json:"active,omitempty" yaml:"active,omitempty"`

	// events
	Events map[string][]string `json:"events,omitempty" yaml:"events,omitempty"`

	// Insecure
	Insecure bool `json:"insecure,omitempty" yaml:"insecure,omitempty"`

	// url of the Webhook
	URL string `json:"url,omitempty" yaml:"url,omitempty"`

	// ID to the Webhook
	WebhookID string `json:"webhook_id,omitempty" yaml:"webhook_id,omitempty"`
}

WebhookResponse Webhook object on list or get

swagger:model WebhookResponse

func (*WebhookResponse) ContextValidate ¶

func (m *WebhookResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this webhook response based on context it is used

func (*WebhookResponse) MarshalBinary ¶

func (m *WebhookResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*WebhookResponse) UnmarshalBinary ¶

func (m *WebhookResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*WebhookResponse) Validate ¶

func (m *WebhookResponse) Validate(formats strfmt.Registry) error

Validate validates this webhook response

type WebhooksResponse ¶

type WebhooksResponse struct {

	// list of Webhooks
	// in:body
	Webhooks []*WebhookResponse `json:"webhooks" yaml:"webhooks"`
}

WebhooksResponse Webhooks

swagger:model WebhooksResponse

func (*WebhooksResponse) ContextValidate ¶

func (m *WebhooksResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this webhooks response based on the context it is used

func (*WebhooksResponse) MarshalBinary ¶

func (m *WebhooksResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*WebhooksResponse) UnmarshalBinary ¶

func (m *WebhooksResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*WebhooksResponse) Validate ¶

func (m *WebhooksResponse) Validate(formats strfmt.Registry) error

Validate validates this webhooks response

type WorkspaceIDP ¶

type WorkspaceIDP struct {

	// attributes
	Attributes Attributes `json:"attributes,omitempty" yaml:"attributes,omitempty"`

	// ID of the authorization server (workspace) to which the IDP is connected
	AuthorizationServerID string `json:"authorization_server_id,omitempty" yaml:"authorization_server_id,omitempty"`

	// Client application ID
	//
	// It serves as a reference to a client application that is created in the System authorization
	// server (workspace), when a custom login page is created.
	ClientID string `json:"client_id,omitempty" yaml:"client_id,omitempty"`

	// config
	Config *IDPConfiguration `json:"config,omitempty" yaml:"config,omitempty"`

	// If set to `true`, the IDP is disabled
	//
	// When an IDP is disabled, it is not available for the users to be used. It is also not
	// displayed on the login page.
	Disabled bool `json:"disabled,omitempty" yaml:"disabled,omitempty"`

	// discovery settings
	DiscoverySettings *IDPDiscoverySettings `json:"discovery_settings,omitempty" yaml:"discovery_settings,omitempty"`

	// Can be used to e.g. modify the order in which the Identity Providers are presented on the login page.
	// Example: 1
	DisplayOrder int64 `json:"display_order,omitempty" yaml:"display_order,omitempty"`

	// If set to `true`, the IDP is not displayed on the login page.
	//
	// When an IDP is hidden, it will not be displayed on the login page. It can still be used
	// and script extensions can enabled it.
	Hidden bool `json:"hidden,omitempty" yaml:"hidden,omitempty"`

	// Unique ID of your identity provider
	//
	// If not provided, a random ID is generated.
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// ID of the Identity Pool to which the IDP is connected
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// jit
	Jit *JITSettings `json:"jit,omitempty" yaml:"jit,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// mappings
	Mappings Mappings `json:"mappings,omitempty" yaml:"mappings,omitempty"`

	// Defines the type of an IDP
	//
	// Cloudentity is designed to make it possible for you to bring any of your own IDPs and integrate it
	// with Cloudentity as it delivers enterprise connectors for major Cloud IDPs and a possibility for
	// custom integration DKS for home-built solutions. You can also use built-in Sandbox IDP, which
	// is a static IDP, to create an IDP for testing purposes.
	Method string `json:"method,omitempty" yaml:"method,omitempty"`

	// Display name of your IDP
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// Points to the ID of the custom app, null if not set
	PostAuthnAppID string `json:"post_authn_app_id,omitempty" yaml:"post_authn_app_id,omitempty"`

	// sso settings
	SsoSettings *IDPSSOSettings `json:"sso_settings,omitempty" yaml:"sso_settings,omitempty"`

	// Authentication method reference
	//
	// An array of case sensitive strings for authentication methods that are used in the user
	// authentication.
	//
	// For example, an IDP may require the user to provide a biometric authentication using facial
	// recognition. For that, the value of the authentication method reference is `face`.
	StaticAmr []string `json:"static_amr" yaml:"static_amr"`

	// ID of the tenant where an IDP is connected
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// token exchange settings
	TokenExchangeSettings *IDPTokenExchangeSettings `json:"token_exchange_settings,omitempty" yaml:"token_exchange_settings,omitempty"`

	// IDP version to track internal changes
	// version that is currently supported: 3
	Version int64 `json:"version,omitempty" yaml:"version,omitempty"`

	// ID of the Workspace to which the IDP is connected
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

WorkspaceIDP workspace ID p

swagger:model WorkspaceIDP

func (*WorkspaceIDP) ContextValidate ¶

func (m *WorkspaceIDP) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this workspace ID p based on the context it is used

func (*WorkspaceIDP) MarshalBinary ¶

func (m *WorkspaceIDP) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*WorkspaceIDP) UnmarshalBinary ¶

func (m *WorkspaceIDP) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*WorkspaceIDP) Validate ¶

func (m *WorkspaceIDP) Validate(formats strfmt.Registry) error

Validate validates this workspace ID p

type WorkspaceMetadata ¶

type WorkspaceMetadata struct {

	// payload
	Payload map[string]interface{} `json:"payload,omitempty" yaml:"payload,omitempty"`
}

WorkspaceMetadata workspace metadata

swagger:model WorkspaceMetadata

func (*WorkspaceMetadata) ContextValidate ¶

func (m *WorkspaceMetadata) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this workspace metadata based on context it is used

func (*WorkspaceMetadata) MarshalBinary ¶

func (m *WorkspaceMetadata) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*WorkspaceMetadata) UnmarshalBinary ¶

func (m *WorkspaceMetadata) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*WorkspaceMetadata) Validate ¶

func (m *WorkspaceMetadata) Validate(formats strfmt.Registry) error

Validate validates this workspace metadata

type WorkspacePermissionsResponse ¶

type WorkspacePermissionsResponse struct {

	// create identity pool
	CreateIdentityPool bool `json:"create_identity_pool,omitempty" yaml:"create_identity_pool,omitempty"`

	// delete organization
	DeleteOrganization bool `json:"delete_organization,omitempty" yaml:"delete_organization,omitempty"`

	// delete workspace
	DeleteWorkspace bool `json:"delete_workspace,omitempty" yaml:"delete_workspace,omitempty"`

	// discover workspace
	DiscoverWorkspace bool `json:"discover_workspace,omitempty" yaml:"discover_workspace,omitempty"`

	// get organization
	GetOrganization bool `json:"get_organization,omitempty" yaml:"get_organization,omitempty"`

	// get workspace
	GetWorkspace bool `json:"get_workspace,omitempty" yaml:"get_workspace,omitempty"`

	// list identity pools
	ListIdentityPools bool `json:"list_identity_pools,omitempty" yaml:"list_identity_pools,omitempty"`

	// manage admin role
	ManageAdminRole bool `json:"manage_admin_role,omitempty" yaml:"manage_admin_role,omitempty"`

	// manage apis
	ManageApis bool `json:"manage_apis,omitempty" yaml:"manage_apis,omitempty"`

	// manage auditor role
	ManageAuditorRole bool `json:"manage_auditor_role,omitempty" yaml:"manage_auditor_role,omitempty"`

	// manage authorization details
	ManageAuthorizationDetails bool `json:"manage_authorization_details,omitempty" yaml:"manage_authorization_details,omitempty"`

	// manage claims
	ManageClaims bool `json:"manage_claims,omitempty" yaml:"manage_claims,omitempty"`

	// manage clients
	ManageClients bool `json:"manage_clients,omitempty" yaml:"manage_clients,omitempty"`

	// manage custom apps
	ManageCustomApps bool `json:"manage_custom_apps,omitempty" yaml:"manage_custom_apps,omitempty"`

	// manage gateways
	ManageGateways bool `json:"manage_gateways,omitempty" yaml:"manage_gateways,omitempty"`

	// manage idps
	ManageIdps bool `json:"manage_idps,omitempty" yaml:"manage_idps,omitempty"`

	// manage manager role
	ManageManagerRole bool `json:"manage_manager_role,omitempty" yaml:"manage_manager_role,omitempty"`

	// manage member role
	ManageMemberRole bool `json:"manage_member_role,omitempty" yaml:"manage_member_role,omitempty"`

	// manage policies
	ManagePolicies bool `json:"manage_policies,omitempty" yaml:"manage_policies,omitempty"`

	// manage scripts
	ManageScripts bool `json:"manage_scripts,omitempty" yaml:"manage_scripts,omitempty"`

	// manage secrets
	ManageSecrets bool `json:"manage_secrets,omitempty" yaml:"manage_secrets,omitempty"`

	// manage services
	ManageServices bool `json:"manage_services,omitempty" yaml:"manage_services,omitempty"`

	// manage user manager role
	ManageUserManagerRole bool `json:"manage_user_manager_role,omitempty" yaml:"manage_user_manager_role,omitempty"`

	// manage webhooks
	ManageWebhooks bool `json:"manage_webhooks,omitempty" yaml:"manage_webhooks,omitempty"`

	// read analytics
	ReadAnalytics bool `json:"read_analytics,omitempty" yaml:"read_analytics,omitempty"`

	// read apis
	ReadApis bool `json:"read_apis,omitempty" yaml:"read_apis,omitempty"`

	// read audit events
	ReadAuditEvents bool `json:"read_audit_events,omitempty" yaml:"read_audit_events,omitempty"`

	// read authorization details
	ReadAuthorizationDetails bool `json:"read_authorization_details,omitempty" yaml:"read_authorization_details,omitempty"`

	// read claims
	ReadClaims bool `json:"read_claims,omitempty" yaml:"read_claims,omitempty"`

	// read clients
	ReadClients bool `json:"read_clients,omitempty" yaml:"read_clients,omitempty"`

	// read custom apps
	ReadCustomApps bool `json:"read_custom_apps,omitempty" yaml:"read_custom_apps,omitempty"`

	// read gateways
	ReadGateways bool `json:"read_gateways,omitempty" yaml:"read_gateways,omitempty"`

	// read idps
	ReadIdps bool `json:"read_idps,omitempty" yaml:"read_idps,omitempty"`

	// read policies
	ReadPolicies bool `json:"read_policies,omitempty" yaml:"read_policies,omitempty"`

	// read roles
	ReadRoles bool `json:"read_roles,omitempty" yaml:"read_roles,omitempty"`

	// read scripts
	ReadScripts bool `json:"read_scripts,omitempty" yaml:"read_scripts,omitempty"`

	// read secrets
	ReadSecrets bool `json:"read_secrets,omitempty" yaml:"read_secrets,omitempty"`

	// read services
	ReadServices bool `json:"read_services,omitempty" yaml:"read_services,omitempty"`

	// read webhooks
	ReadWebhooks bool `json:"read_webhooks,omitempty" yaml:"read_webhooks,omitempty"`

	// update organization
	UpdateOrganization bool `json:"update_organization,omitempty" yaml:"update_organization,omitempty"`

	// update workspace
	UpdateWorkspace bool `json:"update_workspace,omitempty" yaml:"update_workspace,omitempty"`

	// update workspace metadata
	UpdateWorkspaceMetadata bool `json:"update_workspace_metadata,omitempty" yaml:"update_workspace_metadata,omitempty"`
}

WorkspacePermissionsResponse workspace permissions response

swagger:model WorkspacePermissionsResponse

func (*WorkspacePermissionsResponse) ContextValidate ¶

func (m *WorkspacePermissionsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this workspace permissions response based on context it is used

func (*WorkspacePermissionsResponse) MarshalBinary ¶

func (m *WorkspacePermissionsResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*WorkspacePermissionsResponse) UnmarshalBinary ¶

func (m *WorkspacePermissionsResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*WorkspacePermissionsResponse) Validate ¶

func (m *WorkspacePermissionsResponse) Validate(formats strfmt.Registry) error

Validate validates this workspace permissions response

type WorkspaceResponse ¶

type WorkspaceResponse struct {

	// Your server's label color in a HEX format.
	// Example: #007FFF
	Color string `json:"color,omitempty" yaml:"color,omitempty"`

	// Display description of the workspace
	// Example: Server description
	Description string `json:"description,omitempty" yaml:"description,omitempty"`

	// Unique identifier of an workspace
	// Example: default
	ID string `json:"id,omitempty" yaml:"id,omitempty"`

	// issuer url
	IssuerURL string `json:"issuer_url,omitempty" yaml:"issuer_url,omitempty"`

	// Logo URI
	LogoURI string `json:"logo_uri,omitempty" yaml:"logo_uri,omitempty"`

	// metadata
	Metadata *ServerMetadata `json:"metadata,omitempty" yaml:"metadata,omitempty"`

	// Display name of the workspace
	//
	// If not provided, a random ID is generated.
	// Example: default
	Name string `json:"name,omitempty" yaml:"name,omitempty"`

	// The profile of a server
	//
	// ACP is delivered with preconfigured workspace templates that enable quick and easy setup for
	// specific configuration patterns. For example, you can instantly create an Open Banking
	// compliant workspace that has all of the required mechanisms and settings already in place.
	// Example: default
	// Enum: [default demo workforce consumer partners third_party fapi_advanced fapi_rw fapi_ro openbanking_uk_fapi_advanced openbanking_uk openbanking_br cdr_australia cdr_australia_fapi_rw fdx openbanking_ksa fapi_20_security fapi_20_message_signing connect_id]
	Profile string `json:"profile,omitempty" yaml:"profile,omitempty"`

	// Subject format
	// Enum: [hash legacy]
	SubjectFormat string `json:"subject_format,omitempty" yaml:"subject_format,omitempty"`

	// Subject identifier algorithm salt
	SubjectIdentifierAlgorithmSalt string `json:"subject_identifier_algorithm_salt,omitempty" yaml:"subject_identifier_algorithm_salt,omitempty"`

	// template
	Template bool `json:"template,omitempty" yaml:"template,omitempty"`

	// optional theme id
	ThemeID string `json:"theme_id,omitempty" yaml:"theme_id,omitempty"`

	// Server type
	//
	// It is an internal property used to recognize if the server is created for an admin portal,
	// a developer portal, or if it is a system or a regular workspace.
	// Example: regular
	// Enum: [admin developer system regular organization]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`
}

WorkspaceResponse workspace response

swagger:model WorkspaceResponse

func (*WorkspaceResponse) ContextValidate ¶

func (m *WorkspaceResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this workspace response based on the context it is used

func (*WorkspaceResponse) MarshalBinary ¶

func (m *WorkspaceResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*WorkspaceResponse) UnmarshalBinary ¶

func (m *WorkspaceResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*WorkspaceResponse) Validate ¶

func (m *WorkspaceResponse) Validate(formats strfmt.Registry) error

Validate validates this workspace response

type WorkspaceRoleSubject ¶

type WorkspaceRoleSubject struct {

	// identity pool user pool id
	IdentityPoolID string `json:"identity_pool_id,omitempty" yaml:"identity_pool_id,omitempty"`

	// identity pool user id
	IdentityPoolUserID string `json:"identity_pool_user_id,omitempty" yaml:"identity_pool_user_id,omitempty"`

	// idp user idp id
	IdpID string `json:"idp_id,omitempty" yaml:"idp_id,omitempty"`

	// roles
	Roles *WorkspaceRoles `json:"roles,omitempty" yaml:"roles,omitempty"`

	// tenant id
	TenantID string `json:"tenant_id,omitempty" yaml:"tenant_id,omitempty"`

	// type
	// Enum: [identity_pool_user idp]
	Type string `json:"type,omitempty" yaml:"type,omitempty"`

	// idp user workspace id
	WorkspaceID string `json:"workspace_id,omitempty" yaml:"workspace_id,omitempty"`
}

WorkspaceRoleSubject workspace role subject

swagger:model WorkspaceRoleSubject

func (*WorkspaceRoleSubject) ContextValidate ¶

func (m *WorkspaceRoleSubject) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this workspace role subject based on the context it is used

func (*WorkspaceRoleSubject) MarshalBinary ¶

func (m *WorkspaceRoleSubject) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*WorkspaceRoleSubject) UnmarshalBinary ¶

func (m *WorkspaceRoleSubject) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*WorkspaceRoleSubject) Validate ¶

func (m *WorkspaceRoleSubject) Validate(formats strfmt.Registry) error

Validate validates this workspace role subject

type WorkspaceRoles ¶

type WorkspaceRoles struct {

	// admin
	Admin bool `json:"admin,omitempty" yaml:"admin,omitempty"`

	// auditor
	Auditor bool `json:"auditor,omitempty" yaml:"auditor,omitempty"`

	// manager
	Manager bool `json:"manager,omitempty" yaml:"manager,omitempty"`

	// member
	Member bool `json:"member,omitempty" yaml:"member,omitempty"`

	// user manager
	UserManager bool `json:"user_manager,omitempty" yaml:"user_manager,omitempty"`
}

WorkspaceRoles workspace roles

swagger:model WorkspaceRoles

func (*WorkspaceRoles) ContextValidate ¶

func (m *WorkspaceRoles) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validates this workspace roles based on context it is used

func (*WorkspaceRoles) MarshalBinary ¶

func (m *WorkspaceRoles) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*WorkspaceRoles) UnmarshalBinary ¶

func (m *WorkspaceRoles) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*WorkspaceRoles) Validate ¶

func (m *WorkspaceRoles) Validate(formats strfmt.Registry) error

Validate validates this workspace roles

type WorkspaceRolesResponse ¶

type WorkspaceRolesResponse struct {

	// subjects
	Subjects []*WorkspaceRoleSubject `json:"subjects" yaml:"subjects"`
}

WorkspaceRolesResponse workspace roles response

swagger:model WorkspaceRolesResponse

func (*WorkspaceRolesResponse) ContextValidate ¶

func (m *WorkspaceRolesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this workspace roles response based on the context it is used

func (*WorkspaceRolesResponse) MarshalBinary ¶

func (m *WorkspaceRolesResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*WorkspaceRolesResponse) UnmarshalBinary ¶

func (m *WorkspaceRolesResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*WorkspaceRolesResponse) Validate ¶

func (m *WorkspaceRolesResponse) Validate(formats strfmt.Registry) error

Validate validates this workspace roles response

type WorkspacesResponse ¶

type WorkspacesResponse struct {

	// workspaces
	Workspaces []*WorkspaceResponse `json:"workspaces" yaml:"workspaces"`
}

WorkspacesResponse workspaces response

swagger:model WorkspacesResponse

func (*WorkspacesResponse) ContextValidate ¶

func (m *WorkspacesResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this workspaces response based on the context it is used

func (*WorkspacesResponse) MarshalBinary ¶

func (m *WorkspacesResponse) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*WorkspacesResponse) UnmarshalBinary ¶

func (m *WorkspacesResponse) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*WorkspacesResponse) Validate ¶

func (m *WorkspacesResponse) Validate(formats strfmt.Registry) error

Validate validates this workspaces response

type X509Certificate ¶

type X509Certificate struct {

	// data
	Data string `json:"Data,omitempty" yaml:"Data,omitempty"`

	// XML name
	XMLName *Name `json:"XMLName,omitempty" yaml:"XMLName,omitempty"`
}

X509Certificate X509Certificate represents the XMLSEC object of the same name

swagger:model X509Certificate

func (*X509Certificate) ContextValidate ¶

func (m *X509Certificate) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this x509 certificate based on the context it is used

func (*X509Certificate) MarshalBinary ¶

func (m *X509Certificate) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*X509Certificate) UnmarshalBinary ¶

func (m *X509Certificate) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*X509Certificate) Validate ¶

func (m *X509Certificate) Validate(formats strfmt.Registry) error

Validate validates this x509 certificate

type X509Data ¶

type X509Data struct {

	// x509 certificates
	X509Certificates []*X509Certificate `json:"X509Certificates" yaml:"X509Certificates"`

	// XML name
	XMLName *Name `json:"XMLName,omitempty" yaml:"XMLName,omitempty"`
}

X509Data X509Data represents the XMLSEC object of the same name

swagger:model X509Data

func (*X509Data) ContextValidate ¶

func (m *X509Data) ContextValidate(ctx context.Context, formats strfmt.Registry) error

ContextValidate validate this x509 data based on the context it is used

func (*X509Data) MarshalBinary ¶

func (m *X509Data) MarshalBinary() ([]byte, error)

MarshalBinary interface implementation

func (*X509Data) UnmarshalBinary ¶

func (m *X509Data) UnmarshalBinary(b []byte) error

UnmarshalBinary interface implementation

func (*X509Data) Validate ¶

func (m *X509Data) Validate(formats strfmt.Registry) error

Validate validates this x509 data

Source Files ¶

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL