#[non_exhaustive]pub struct AuthenticateOidcActionConfig { /* private fields */ }Expand description
Request parameters when using an identity provider (IdP) that is compliant with OpenID Connect (OIDC) to authenticate users.
Implementations§
source§impl AuthenticateOidcActionConfig
impl AuthenticateOidcActionConfig
sourcepub fn issuer(&self) -> Option<&str>
pub fn issuer(&self) -> Option<&str>
The OIDC issuer identifier of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
The authorization endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
sourcepub fn token_endpoint(&self) -> Option<&str>
pub fn token_endpoint(&self) -> Option<&str>
The token endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
sourcepub fn user_info_endpoint(&self) -> Option<&str>
pub fn user_info_endpoint(&self) -> Option<&str>
The user info endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
sourcepub fn client_secret(&self) -> Option<&str>
pub fn client_secret(&self) -> Option<&str>
The OAuth 2.0 client secret. This parameter is required if you are creating a rule. If you are modifying a rule, you can omit this parameter if you set UseExistingClientSecret to true.
The name of the cookie used to maintain session information. The default is AWSELBAuthSessionCookie.
sourcepub fn scope(&self) -> Option<&str>
pub fn scope(&self) -> Option<&str>
The set of user claims to be requested from the IdP. The default is openid.
To verify which scope values your IdP supports and how to separate multiple values, see the documentation for your IdP.
sourcepub fn session_timeout(&self) -> Option<i64>
pub fn session_timeout(&self) -> Option<i64>
The maximum duration of the authentication session, in seconds. The default is 604800 seconds (7 days).
sourcepub fn authentication_request_extra_params(
&self
) -> Option<&HashMap<String, String>>
pub fn authentication_request_extra_params( &self ) -> Option<&HashMap<String, String>>
The query parameters (up to 10) to include in the redirect request to the authorization endpoint.
sourcepub fn on_unauthenticated_request(
&self
) -> Option<&AuthenticateOidcActionConditionalBehaviorEnum>
pub fn on_unauthenticated_request( &self ) -> Option<&AuthenticateOidcActionConditionalBehaviorEnum>
The behavior if the user is not authenticated. The following are possible values:
-
deny
- Return an HTTP 401 Unauthorized error. -
allow
- Allow the request to be forwarded to the target. -
authenticate
- Redirect the request to the IdP authorization endpoint. This is the default value.
sourcepub fn use_existing_client_secret(&self) -> Option<bool>
pub fn use_existing_client_secret(&self) -> Option<bool>
Indicates whether to use the existing client secret when modifying a rule. If you are creating a rule, you can omit this parameter or set it to false.
source§impl AuthenticateOidcActionConfig
impl AuthenticateOidcActionConfig
sourcepub fn builder() -> AuthenticateOidcActionConfigBuilder
pub fn builder() -> AuthenticateOidcActionConfigBuilder
Creates a new builder-style object to manufacture AuthenticateOidcActionConfig.
Trait Implementations§
source§impl Clone for AuthenticateOidcActionConfig
impl Clone for AuthenticateOidcActionConfig
source§fn clone(&self) -> AuthenticateOidcActionConfig
fn clone(&self) -> AuthenticateOidcActionConfig
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read moresource§impl Debug for AuthenticateOidcActionConfig
impl Debug for AuthenticateOidcActionConfig
source§impl PartialEq<AuthenticateOidcActionConfig> for AuthenticateOidcActionConfig
impl PartialEq<AuthenticateOidcActionConfig> for AuthenticateOidcActionConfig
source§fn eq(&self, other: &AuthenticateOidcActionConfig) -> bool
fn eq(&self, other: &AuthenticateOidcActionConfig) -> bool
self and other values to be equal, and is used
by ==.