#[non_exhaustive]pub struct AuthenticateOidcActionConfig {
pub issuer: Option<String>,
pub authorization_endpoint: Option<String>,
pub token_endpoint: Option<String>,
pub user_info_endpoint: Option<String>,
pub client_id: Option<String>,
pub client_secret: Option<String>,
pub session_cookie_name: Option<String>,
pub scope: Option<String>,
pub session_timeout: Option<i64>,
pub authentication_request_extra_params: Option<HashMap<String, String>>,
pub on_unauthenticated_request: Option<AuthenticateOidcActionConditionalBehaviorEnum>,
pub use_existing_client_secret: Option<bool>,
}
Expand description
Request parameters when using an identity provider (IdP) that is compliant with OpenID Connect (OIDC) to authenticate users.
Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.issuer: Option<String>
The OIDC issuer identifier of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
The authorization endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
token_endpoint: Option<String>
The token endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
user_info_endpoint: Option<String>
The user info endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
client_id: Option<String>
The OAuth 2.0 client identifier.
client_secret: Option<String>
The OAuth 2.0 client secret. This parameter is required if you are creating a rule. If you are modifying a rule, you can omit this parameter if you set UseExistingClientSecret
to true.
The name of the cookie used to maintain session information. The default is AWSELBAuthSessionCookie.
scope: Option<String>
The set of user claims to be requested from the IdP. The default is openid
.
To verify which scope values your IdP supports and how to separate multiple values, see the documentation for your IdP.
session_timeout: Option<i64>
The maximum duration of the authentication session, in seconds. The default is 604800 seconds (7 days).
authentication_request_extra_params: Option<HashMap<String, String>>
The query parameters (up to 10) to include in the redirect request to the authorization endpoint.
on_unauthenticated_request: Option<AuthenticateOidcActionConditionalBehaviorEnum>
The behavior if the user is not authenticated. The following are possible values:
-
deny
- Return an HTTP 401 Unauthorized error.
-
allow
- Allow the request to be forwarded to the target.
-
authenticate
- Redirect the request to the IdP authorization endpoint. This is the default value.
use_existing_client_secret: Option<bool>
Indicates whether to use the existing client secret when modifying a rule. If you are creating a rule, you can omit this parameter or set it to false.
Implementations
sourceimpl AuthenticateOidcActionConfig
impl AuthenticateOidcActionConfig
sourcepub fn issuer(&self) -> Option<&str>
pub fn issuer(&self) -> Option<&str>
The OIDC issuer identifier of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
The authorization endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
sourcepub fn token_endpoint(&self) -> Option<&str>
pub fn token_endpoint(&self) -> Option<&str>
The token endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
sourcepub fn user_info_endpoint(&self) -> Option<&str>
pub fn user_info_endpoint(&self) -> Option<&str>
The user info endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
sourcepub fn client_secret(&self) -> Option<&str>
pub fn client_secret(&self) -> Option<&str>
The OAuth 2.0 client secret. This parameter is required if you are creating a rule. If you are modifying a rule, you can omit this parameter if you set UseExistingClientSecret
to true.
The name of the cookie used to maintain session information. The default is AWSELBAuthSessionCookie.
sourcepub fn scope(&self) -> Option<&str>
pub fn scope(&self) -> Option<&str>
The set of user claims to be requested from the IdP. The default is openid
.
To verify which scope values your IdP supports and how to separate multiple values, see the documentation for your IdP.
sourcepub fn session_timeout(&self) -> Option<i64>
pub fn session_timeout(&self) -> Option<i64>
The maximum duration of the authentication session, in seconds. The default is 604800 seconds (7 days).
sourcepub fn authentication_request_extra_params(
&self
) -> Option<&HashMap<String, String>>
pub fn authentication_request_extra_params(
&self
) -> Option<&HashMap<String, String>>
The query parameters (up to 10) to include in the redirect request to the authorization endpoint.
sourcepub fn on_unauthenticated_request(
&self
) -> Option<&AuthenticateOidcActionConditionalBehaviorEnum>
pub fn on_unauthenticated_request(
&self
) -> Option<&AuthenticateOidcActionConditionalBehaviorEnum>
The behavior if the user is not authenticated. The following are possible values:
-
deny
- Return an HTTP 401 Unauthorized error.
-
allow
- Allow the request to be forwarded to the target.
-
authenticate
- Redirect the request to the IdP authorization endpoint. This is the default value.
sourcepub fn use_existing_client_secret(&self) -> Option<bool>
pub fn use_existing_client_secret(&self) -> Option<bool>
Indicates whether to use the existing client secret when modifying a rule. If you are creating a rule, you can omit this parameter or set it to false.
sourceimpl AuthenticateOidcActionConfig
impl AuthenticateOidcActionConfig
sourcepub fn builder() -> Builder
pub fn builder() -> Builder
Creates a new builder-style object to manufacture AuthenticateOidcActionConfig
Trait Implementations
sourceimpl Clone for AuthenticateOidcActionConfig
impl Clone for AuthenticateOidcActionConfig
sourcefn clone(&self) -> AuthenticateOidcActionConfig
fn clone(&self) -> AuthenticateOidcActionConfig
Returns a copy of the value. Read more
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source
. Read more
sourceimpl Debug for AuthenticateOidcActionConfig
impl Debug for AuthenticateOidcActionConfig
sourceimpl PartialEq<AuthenticateOidcActionConfig> for AuthenticateOidcActionConfig
impl PartialEq<AuthenticateOidcActionConfig> for AuthenticateOidcActionConfig
sourcefn eq(&self, other: &AuthenticateOidcActionConfig) -> bool
fn eq(&self, other: &AuthenticateOidcActionConfig) -> bool
This method tests for self
and other
values to be equal, and is used
by ==
. Read more
sourcefn ne(&self, other: &AuthenticateOidcActionConfig) -> bool
fn ne(&self, other: &AuthenticateOidcActionConfig) -> bool
This method tests for !=
.
impl StructuralPartialEq for AuthenticateOidcActionConfig
Auto Trait Implementations
impl RefUnwindSafe for AuthenticateOidcActionConfig
impl Send for AuthenticateOidcActionConfig
impl Sync for AuthenticateOidcActionConfig
impl Unpin for AuthenticateOidcActionConfig
impl UnwindSafe for AuthenticateOidcActionConfig
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcefn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<T> Instrument for T
impl<T> Instrument for T
sourcefn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
sourcefn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
sourceimpl<T> ToOwned for T where
T: Clone,
impl<T> ToOwned for T where
T: Clone,
type Owned = T
type Owned = T
The resulting type after obtaining ownership.
sourcefn clone_into(&self, target: &mut T)
fn clone_into(&self, target: &mut T)
toowned_clone_into
)Uses borrowed data to replace owned data, usually by cloning. Read more
sourceimpl<T> WithSubscriber for T
impl<T> WithSubscriber for T
sourcefn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
Attaches the provided Subscriber
to this type, returning a
WithDispatch
wrapper. Read more
sourcefn with_current_subscriber(self) -> WithDispatch<Self>
fn with_current_subscriber(self) -> WithDispatch<Self>
Attaches the current default Subscriber
to this type, returning a
WithDispatch
wrapper. Read more