#[non_exhaustive]pub struct AuthenticateOidcActionConfig {
pub issuer: Option<String>,
pub authorization_endpoint: Option<String>,
pub token_endpoint: Option<String>,
pub user_info_endpoint: Option<String>,
pub client_id: Option<String>,
pub client_secret: Option<String>,
pub session_cookie_name: Option<String>,
pub scope: Option<String>,
pub session_timeout: Option<i64>,
pub authentication_request_extra_params: Option<HashMap<String, String>>,
pub on_unauthenticated_request: Option<AuthenticateOidcActionConditionalBehaviorEnum>,
pub use_existing_client_secret: Option<bool>,
}
Expand description
Request parameters when using an identity provider (IdP) that is compliant with OpenID Connect (OIDC) to authenticate users.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.issuer: Option<String>
The OIDC issuer identifier of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
The authorization endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
token_endpoint: Option<String>
The token endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
user_info_endpoint: Option<String>
The user info endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
client_id: Option<String>
The OAuth 2.0 client identifier.
client_secret: Option<String>
The OAuth 2.0 client secret. This parameter is required if you are creating a rule. If you are modifying a rule, you can omit this parameter if you set UseExistingClientSecret
to true.
The name of the cookie used to maintain session information. The default is AWSELBAuthSessionCookie.
scope: Option<String>
The set of user claims to be requested from the IdP. The default is openid
.
To verify which scope values your IdP supports and how to separate multiple values, see the documentation for your IdP.
session_timeout: Option<i64>
The maximum duration of the authentication session, in seconds. The default is 604800 seconds (7 days).
authentication_request_extra_params: Option<HashMap<String, String>>
The query parameters (up to 10) to include in the redirect request to the authorization endpoint.
on_unauthenticated_request: Option<AuthenticateOidcActionConditionalBehaviorEnum>
The behavior if the user is not authenticated. The following are possible values:
-
deny
- Return an HTTP 401 Unauthorized error.
-
allow
- Allow the request to be forwarded to the target.
-
authenticate
- Redirect the request to the IdP authorization endpoint. This is the default value.
use_existing_client_secret: Option<bool>
Indicates whether to use the existing client secret when modifying a rule. If you are creating a rule, you can omit this parameter or set it to false.
Implementations§
source§impl AuthenticateOidcActionConfig
impl AuthenticateOidcActionConfig
sourcepub fn issuer(&self) -> Option<&str>
pub fn issuer(&self) -> Option<&str>
The OIDC issuer identifier of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
The authorization endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
sourcepub fn token_endpoint(&self) -> Option<&str>
pub fn token_endpoint(&self) -> Option<&str>
The token endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
sourcepub fn user_info_endpoint(&self) -> Option<&str>
pub fn user_info_endpoint(&self) -> Option<&str>
The user info endpoint of the IdP. This must be a full URL, including the HTTPS protocol, the domain, and the path.
sourcepub fn client_secret(&self) -> Option<&str>
pub fn client_secret(&self) -> Option<&str>
The OAuth 2.0 client secret. This parameter is required if you are creating a rule. If you are modifying a rule, you can omit this parameter if you set UseExistingClientSecret
to true.
The name of the cookie used to maintain session information. The default is AWSELBAuthSessionCookie.
sourcepub fn scope(&self) -> Option<&str>
pub fn scope(&self) -> Option<&str>
The set of user claims to be requested from the IdP. The default is openid
.
To verify which scope values your IdP supports and how to separate multiple values, see the documentation for your IdP.
sourcepub fn session_timeout(&self) -> Option<i64>
pub fn session_timeout(&self) -> Option<i64>
The maximum duration of the authentication session, in seconds. The default is 604800 seconds (7 days).
sourcepub fn authentication_request_extra_params(
&self
) -> Option<&HashMap<String, String>>
pub fn authentication_request_extra_params( &self ) -> Option<&HashMap<String, String>>
The query parameters (up to 10) to include in the redirect request to the authorization endpoint.
sourcepub fn on_unauthenticated_request(
&self
) -> Option<&AuthenticateOidcActionConditionalBehaviorEnum>
pub fn on_unauthenticated_request( &self ) -> Option<&AuthenticateOidcActionConditionalBehaviorEnum>
The behavior if the user is not authenticated. The following are possible values:
-
deny
- Return an HTTP 401 Unauthorized error.
-
allow
- Allow the request to be forwarded to the target.
-
authenticate
- Redirect the request to the IdP authorization endpoint. This is the default value.
sourcepub fn use_existing_client_secret(&self) -> Option<bool>
pub fn use_existing_client_secret(&self) -> Option<bool>
Indicates whether to use the existing client secret when modifying a rule. If you are creating a rule, you can omit this parameter or set it to false.
source§impl AuthenticateOidcActionConfig
impl AuthenticateOidcActionConfig
sourcepub fn builder() -> AuthenticateOidcActionConfigBuilder
pub fn builder() -> AuthenticateOidcActionConfigBuilder
Creates a new builder-style object to manufacture AuthenticateOidcActionConfig
.
Trait Implementations§
source§impl Clone for AuthenticateOidcActionConfig
impl Clone for AuthenticateOidcActionConfig
source§fn clone(&self) -> AuthenticateOidcActionConfig
fn clone(&self) -> AuthenticateOidcActionConfig
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for AuthenticateOidcActionConfig
impl Debug for AuthenticateOidcActionConfig
source§impl PartialEq for AuthenticateOidcActionConfig
impl PartialEq for AuthenticateOidcActionConfig
source§fn eq(&self, other: &AuthenticateOidcActionConfig) -> bool
fn eq(&self, other: &AuthenticateOidcActionConfig) -> bool
self
and other
values to be equal, and is used
by ==
.