pub struct OAuth2ProviderRequest {Show 16 fields
pub name: String,
pub authentication_flow: Option<Option<Uuid>>,
pub authorization_flow: Uuid,
pub property_mappings: Option<Vec<Uuid>>,
pub client_type: Option<ClientTypeEnum>,
pub client_id: Option<String>,
pub client_secret: Option<String>,
pub access_code_validity: Option<String>,
pub access_token_validity: Option<String>,
pub refresh_token_validity: Option<String>,
pub include_claims_in_id_token: Option<bool>,
pub signing_key: Option<Option<Uuid>>,
pub redirect_uris: Option<String>,
pub sub_mode: Option<SubModeEnum>,
pub issuer_mode: Option<IssuerModeEnum>,
pub jwks_sources: Option<Vec<Uuid>>,
}
Expand description
OAuth2ProviderRequest : OAuth2Provider Serializer
Fields§
§name: String
§authentication_flow: Option<Option<Uuid>>
Flow used for authentication when the associated application is accessed by an un-authenticated user.
Flow used when authorizing this provider.
property_mappings: Option<Vec<Uuid>>
§client_type: Option<ClientTypeEnum>
Confidential clients are capable of maintaining the confidentiality of their credentials. Public clients are incapable * confidential
- Confidential * public
- Public
client_id: Option<String>
§client_secret: Option<String>
§access_code_validity: Option<String>
Access codes not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
access_token_validity: Option<String>
Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
refresh_token_validity: Option<String>
Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
include_claims_in_id_token: Option<bool>
Include User claims from scopes in the id_token, for applications that don’t access the userinfo endpoint.
signing_key: Option<Option<Uuid>>
Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
redirect_uris: Option<String>
Enter each URI on a new line.
sub_mode: Option<SubModeEnum>
Configure what data should be used as unique User Identifier. For most cases, the default should be fine. * hashed_user_id
- Based on the Hashed User ID * user_id
- Based on user ID * user_uuid
- Based on user UUID * user_username
- Based on the username * user_email
- Based on the User’s Email. This is recommended over the UPN method. * user_upn
- Based on the User’s UPN, only works if user has a ‘upn’ attribute set. Use this method only if you have different UPN and Mail domains.
issuer_mode: Option<IssuerModeEnum>
Configure how the issuer field of the ID Token should be filled. * global
- Same identifier is used for all providers * per_provider
- Each provider has a different issuer, based on the application slug.
jwks_sources: Option<Vec<Uuid>>
Implementations§
Source§impl OAuth2ProviderRequest
impl OAuth2ProviderRequest
Sourcepub fn new(name: String, authorization_flow: Uuid) -> OAuth2ProviderRequest
pub fn new(name: String, authorization_flow: Uuid) -> OAuth2ProviderRequest
OAuth2Provider Serializer
Trait Implementations§
Source§impl Clone for OAuth2ProviderRequest
impl Clone for OAuth2ProviderRequest
Source§fn clone(&self) -> OAuth2ProviderRequest
fn clone(&self) -> OAuth2ProviderRequest
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read more