authentik_rust/models/
patched_radius_provider_request.rs

1/*
2 * authentik
3 *
4 * Making authentication simple.
5 *
6 * The version of the OpenAPI document: 2024.2.1
7 * Contact: hello@goauthentik.io
8 * Generated by: https://openapi-generator.tech
9 */
10
11use crate::models;
12
13/// PatchedRadiusProviderRequest : RadiusProvider Serializer
14#[derive(Clone, Default, Debug, PartialEq, Serialize, Deserialize)]
15pub struct PatchedRadiusProviderRequest {
16    #[serde(rename = "name", skip_serializing_if = "Option::is_none")]
17    pub name: Option<String>,
18    /// Flow used for authentication when the associated application is accessed by an un-authenticated user.
19    #[serde(rename = "authentication_flow", default, with = "::serde_with::rust::double_option", skip_serializing_if = "Option::is_none")]
20    pub authentication_flow: Option<Option<uuid::Uuid>>,
21    /// Flow used when authorizing this provider.
22    #[serde(rename = "authorization_flow", skip_serializing_if = "Option::is_none")]
23    pub authorization_flow: Option<uuid::Uuid>,
24    #[serde(rename = "property_mappings", skip_serializing_if = "Option::is_none")]
25    pub property_mappings: Option<Vec<uuid::Uuid>>,
26    /// List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped.
27    #[serde(rename = "client_networks", skip_serializing_if = "Option::is_none")]
28    pub client_networks: Option<String>,
29    /// Shared secret between clients and server to hash packets.
30    #[serde(rename = "shared_secret", skip_serializing_if = "Option::is_none")]
31    pub shared_secret: Option<String>,
32    /// When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
33    #[serde(rename = "mfa_support", skip_serializing_if = "Option::is_none")]
34    pub mfa_support: Option<bool>,
35}
36
37impl PatchedRadiusProviderRequest {
38    /// RadiusProvider Serializer
39    pub fn new() -> PatchedRadiusProviderRequest {
40        PatchedRadiusProviderRequest {
41            name: None,
42            authentication_flow: None,
43            authorization_flow: None,
44            property_mappings: None,
45            client_networks: None,
46            shared_secret: None,
47            mfa_support: None,
48        }
49    }
50}
51