pub struct SamlSourceRequest {Show 20 fields
pub name: String,
pub slug: String,
pub enabled: Option<bool>,
pub authentication_flow: Option<Option<Uuid>>,
pub enrollment_flow: Option<Option<Uuid>>,
pub policy_engine_mode: Option<PolicyEngineMode>,
pub user_matching_mode: Option<UserMatchingModeEnum>,
pub user_path_template: Option<String>,
pub pre_authentication_flow: Uuid,
pub issuer: Option<String>,
pub sso_url: String,
pub slo_url: Option<Option<String>>,
pub allow_idp_initiated: Option<bool>,
pub name_id_policy: Option<NameIdPolicyEnum>,
pub binding_type: Option<BindingTypeEnum>,
pub verification_kp: Option<Option<Uuid>>,
pub signing_kp: Option<Option<Uuid>>,
pub digest_algorithm: Option<DigestAlgorithmEnum>,
pub signature_algorithm: Option<SignatureAlgorithmEnum>,
pub temporary_user_delete_after: Option<String>,
}
Expand description
SamlSourceRequest : SAMLSource Serializer
Fields§
§name: String
Source’s display Name.
slug: String
Internal source name, used in URLs.
enabled: Option<bool>
§authentication_flow: Option<Option<Uuid>>
Flow to use when authenticating existing users.
enrollment_flow: Option<Option<Uuid>>
Flow to use when enrolling new users.
policy_engine_mode: Option<PolicyEngineMode>
§user_matching_mode: Option<UserMatchingModeEnum>
How the source determines if an existing user should be authenticated or a new user enrolled. * identifier
- Use the source-specific identifier * email_link
- Link to a user with identical email address. Can have security implications when a source doesn’t validate email addresses. * email_deny
- Use the user’s email address, but deny enrollment when the email address already exists. * username_link
- Link to a user with identical username. Can have security implications when a username is used with another source. * username_deny
- Use the user’s username, but deny enrollment when the username already exists.
user_path_template: Option<String>
§pre_authentication_flow: Uuid
Flow used before authentication.
issuer: Option<String>
Also known as Entity ID. Defaults the Metadata URL.
sso_url: String
URL that the initial Login request is sent to.
slo_url: Option<Option<String>>
Optional URL if your IDP supports Single-Logout.
allow_idp_initiated: Option<bool>
Allows authentication flows initiated by the IdP. This can be a security risk, as no validation of the request ID is done.
name_id_policy: Option<NameIdPolicyEnum>
NameID Policy sent to the IdP. Can be unset, in which case no Policy is sent. * urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
- Email * urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
- Persistent * urn:oasis:names:tc:SAML:2.0:nameid-format:X509SubjectName
- X509 * urn:oasis:names:tc:SAML:2.0:nameid-format:WindowsDomainQualifiedName
- Windows * urn:oasis:names:tc:SAML:2.0:nameid-format:transient
- Transient
binding_type: Option<BindingTypeEnum>
§verification_kp: Option<Option<Uuid>>
When selected, incoming assertion’s Signatures will be validated against this certificate. To allow unsigned Requests, leave on default.
signing_kp: Option<Option<Uuid>>
Keypair used to sign outgoing Responses going to the Identity Provider.
digest_algorithm: Option<DigestAlgorithmEnum>
§signature_algorithm: Option<SignatureAlgorithmEnum>
§temporary_user_delete_after: Option<String>
Time offset when temporary users should be deleted. This only applies if your IDP uses the NameID Format ‘transient’, and the user doesn’t log out manually. (Format: hours=1;minutes=2;seconds=3).
Implementations§
Trait Implementations§
Source§impl Clone for SamlSourceRequest
impl Clone for SamlSourceRequest
Source§fn clone(&self) -> SamlSourceRequest
fn clone(&self) -> SamlSourceRequest
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read more