pub struct PatchedOAuth2ProviderRequest {Show 16 fields
pub name: Option<String>,
pub authentication_flow: Option<Option<Uuid>>,
pub authorization_flow: Option<Uuid>,
pub property_mappings: Option<Vec<Uuid>>,
pub client_type: Option<ClientTypeEnum>,
pub client_id: Option<String>,
pub client_secret: Option<String>,
pub access_code_validity: Option<String>,
pub access_token_validity: Option<String>,
pub refresh_token_validity: Option<String>,
pub include_claims_in_id_token: Option<bool>,
pub signing_key: Option<Option<Uuid>>,
pub redirect_uris: Option<String>,
pub sub_mode: Option<SubModeEnum>,
pub issuer_mode: Option<IssuerModeEnum>,
pub jwks_sources: Option<Vec<Uuid>>,
}
Expand description
PatchedOAuth2ProviderRequest : OAuth2Provider Serializer
Fields§
§name: Option<String>
§authentication_flow: Option<Option<Uuid>>
Flow used for authentication when the associated application is accessed by an un-authenticated user.
Flow used when authorizing this provider.
property_mappings: Option<Vec<Uuid>>
§client_type: Option<ClientTypeEnum>
Confidential clients are capable of maintaining the confidentiality of their credentials. Public clients are incapable * confidential
- Confidential * public
- Public
client_id: Option<String>
§client_secret: Option<String>
§access_code_validity: Option<String>
Access codes not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
access_token_validity: Option<String>
Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
refresh_token_validity: Option<String>
Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
include_claims_in_id_token: Option<bool>
Include User claims from scopes in the id_token, for applications that don’t access the userinfo endpoint.
signing_key: Option<Option<Uuid>>
Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
redirect_uris: Option<String>
Enter each URI on a new line.
sub_mode: Option<SubModeEnum>
Configure what data should be used as unique User Identifier. For most cases, the default should be fine. * hashed_user_id
- Based on the Hashed User ID * user_id
- Based on user ID * user_uuid
- Based on user UUID * user_username
- Based on the username * user_email
- Based on the User’s Email. This is recommended over the UPN method. * user_upn
- Based on the User’s UPN, only works if user has a ‘upn’ attribute set. Use this method only if you have different UPN and Mail domains.
issuer_mode: Option<IssuerModeEnum>
Configure how the issuer field of the ID Token should be filled. * global
- Same identifier is used for all providers * per_provider
- Each provider has a different issuer, based on the application slug.
jwks_sources: Option<Vec<Uuid>>
Implementations§
Source§impl PatchedOAuth2ProviderRequest
impl PatchedOAuth2ProviderRequest
Sourcepub fn new() -> PatchedOAuth2ProviderRequest
pub fn new() -> PatchedOAuth2ProviderRequest
OAuth2Provider Serializer
Trait Implementations§
Source§impl Clone for PatchedOAuth2ProviderRequest
impl Clone for PatchedOAuth2ProviderRequest
Source§fn clone(&self) -> PatchedOAuth2ProviderRequest
fn clone(&self) -> PatchedOAuth2ProviderRequest
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreSource§impl Debug for PatchedOAuth2ProviderRequest
impl Debug for PatchedOAuth2ProviderRequest
Source§impl Default for PatchedOAuth2ProviderRequest
impl Default for PatchedOAuth2ProviderRequest
Source§fn default() -> PatchedOAuth2ProviderRequest
fn default() -> PatchedOAuth2ProviderRequest
Source§impl<'de> Deserialize<'de> for PatchedOAuth2ProviderRequest
impl<'de> Deserialize<'de> for PatchedOAuth2ProviderRequest
Source§fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
Source§impl PartialEq for PatchedOAuth2ProviderRequest
impl PartialEq for PatchedOAuth2ProviderRequest
Source§fn eq(&self, other: &PatchedOAuth2ProviderRequest) -> bool
fn eq(&self, other: &PatchedOAuth2ProviderRequest) -> bool
self
and other
values to be equal, and is used by ==
.