authentik_rust/models/
ldap_provider.rs

1/*
2 * authentik
3 *
4 * Making authentication simple.
5 *
6 * The version of the OpenAPI document: 2024.2.1
7 * Contact: hello@goauthentik.io
8 * Generated by: https://openapi-generator.tech
9 */
10
11use crate::models;
12
13/// LdapProvider : LDAPProvider Serializer
14#[derive(Clone, Default, Debug, PartialEq, Serialize, Deserialize)]
15pub struct LdapProvider {
16    #[serde(rename = "pk")]
17    pub pk: i32,
18    #[serde(rename = "name")]
19    pub name: String,
20    /// Flow used for authentication when the associated application is accessed by an un-authenticated user.
21    #[serde(rename = "authentication_flow", default, with = "::serde_with::rust::double_option", skip_serializing_if = "Option::is_none")]
22    pub authentication_flow: Option<Option<uuid::Uuid>>,
23    /// Flow used when authorizing this provider.
24    #[serde(rename = "authorization_flow")]
25    pub authorization_flow: uuid::Uuid,
26    #[serde(rename = "property_mappings", skip_serializing_if = "Option::is_none")]
27    pub property_mappings: Option<Vec<uuid::Uuid>>,
28    /// Get object component so that we know how to edit the object
29    #[serde(rename = "component")]
30    pub component: String,
31    /// Internal application name, used in URLs.
32    #[serde(rename = "assigned_application_slug")]
33    pub assigned_application_slug: String,
34    /// Application's display Name.
35    #[serde(rename = "assigned_application_name")]
36    pub assigned_application_name: String,
37    /// Internal application name, used in URLs.
38    #[serde(rename = "assigned_backchannel_application_slug")]
39    pub assigned_backchannel_application_slug: String,
40    /// Application's display Name.
41    #[serde(rename = "assigned_backchannel_application_name")]
42    pub assigned_backchannel_application_name: String,
43    /// Return object's verbose_name
44    #[serde(rename = "verbose_name")]
45    pub verbose_name: String,
46    /// Return object's plural verbose_name
47    #[serde(rename = "verbose_name_plural")]
48    pub verbose_name_plural: String,
49    /// Return internal model name
50    #[serde(rename = "meta_model_name")]
51    pub meta_model_name: String,
52    /// DN under which objects are accessible.
53    #[serde(rename = "base_dn", skip_serializing_if = "Option::is_none")]
54    pub base_dn: Option<String>,
55    /// Users in this group can do search queries. If not set, every user can execute search queries.
56    #[serde(rename = "search_group", default, with = "::serde_with::rust::double_option", skip_serializing_if = "Option::is_none")]
57    pub search_group: Option<Option<uuid::Uuid>>,
58    #[serde(rename = "certificate", default, with = "::serde_with::rust::double_option", skip_serializing_if = "Option::is_none")]
59    pub certificate: Option<Option<uuid::Uuid>>,
60    #[serde(rename = "tls_server_name", skip_serializing_if = "Option::is_none")]
61    pub tls_server_name: Option<String>,
62    /// The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
63    #[serde(rename = "uid_start_number", skip_serializing_if = "Option::is_none")]
64    pub uid_start_number: Option<i32>,
65    /// The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
66    #[serde(rename = "gid_start_number", skip_serializing_if = "Option::is_none")]
67    pub gid_start_number: Option<i32>,
68    #[serde(rename = "outpost_set")]
69    pub outpost_set: Vec<String>,
70    #[serde(rename = "search_mode", skip_serializing_if = "Option::is_none")]
71    pub search_mode: Option<models::LdapapiAccessMode>,
72    #[serde(rename = "bind_mode", skip_serializing_if = "Option::is_none")]
73    pub bind_mode: Option<models::LdapapiAccessMode>,
74    /// When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
75    #[serde(rename = "mfa_support", skip_serializing_if = "Option::is_none")]
76    pub mfa_support: Option<bool>,
77}
78
79impl LdapProvider {
80    /// LDAPProvider Serializer
81    pub fn new(pk: i32, name: String, authorization_flow: uuid::Uuid, component: String, assigned_application_slug: String, assigned_application_name: String, assigned_backchannel_application_slug: String, assigned_backchannel_application_name: String, verbose_name: String, verbose_name_plural: String, meta_model_name: String, outpost_set: Vec<String>) -> LdapProvider {
82        LdapProvider {
83            pk,
84            name,
85            authentication_flow: None,
86            authorization_flow,
87            property_mappings: None,
88            component,
89            assigned_application_slug,
90            assigned_application_name,
91            assigned_backchannel_application_slug,
92            assigned_backchannel_application_name,
93            verbose_name,
94            verbose_name_plural,
95            meta_model_name,
96            base_dn: None,
97            search_group: None,
98            certificate: None,
99            tls_server_name: None,
100            uid_start_number: None,
101            gid_start_number: None,
102            outpost_set,
103            search_mode: None,
104            bind_mode: None,
105            mfa_support: None,
106        }
107    }
108}
109