[][src]Struct open_api_hydra::models::login_request::LoginRequest

pub struct LoginRequest {
    pub challenge: Option<String>,
    pub client: Option<OAuth2Client>,
    pub oidc_context: Option<OpenIdConnectContext>,
    pub request_url: Option<String>,
    pub requested_access_token_audience: Option<Vec<String>>,
    pub requested_scope: Option<Vec<String>>,
    pub session_id: Option<String>,
    pub skip: Option<bool>,
    pub subject: Option<String>,
}

Fields

challenge: Option<String>

Challenge is the identifier ("login challenge") of the login request. It is used to identify the session.

client: Option<OAuth2Client>oidc_context: Option<OpenIdConnectContext>request_url: Option<String>

RequestURL is the original OAuth 2.0 Authorization URL requested by the OAuth 2.0 client. It is the URL which initiates the OAuth 2.0 Authorization Code or OAuth 2.0 Implicit flow. This URL is typically not needed, but might come in handy if you want to deal with additional request parameters.

requested_access_token_audience: Option<Vec<String>>

RequestedScope contains the access token audience as requested by the OAuth 2.0 Client.

requested_scope: Option<Vec<String>>

RequestedScope contains the OAuth 2.0 Scope requested by the OAuth 2.0 Client.

session_id: Option<String>

SessionID is the login session ID. If the user-agent reuses a login session (via cookie / remember flag) this ID will remain the same. If the user-agent did not have an existing authentication session (e.g. remember is false) this will be a new random value. This value is used as the "sid" parameter in the ID Token and in OIDC Front-/Back- channel logout. It's value can generally be used to associate consecutive login requests by a certain user.

skip: Option<bool>

Skip, if true, implies that the client has requested the same scopes from the same user previously. If true, you can skip asking the user to grant the requested scopes, and simply forward the user to the redirect URL. This feature allows you to update / set session information.

subject: Option<String>

Subject is the user ID of the end-user that authenticated. Now, that end user needs to grant or deny the scope requested by the OAuth 2.0 client. If this value is set and skip is true, you MUST include this subject type when accepting the login request, or the request will fail.

Implementations

impl LoginRequest[src]

Trait Implementations

impl Clone for LoginRequest[src]

impl Debug for LoginRequest[src]

impl<'de> Deserialize<'de> for LoginRequest[src]

impl PartialEq<LoginRequest> for LoginRequest[src]

impl Serialize for LoginRequest[src]

impl StructuralPartialEq for LoginRequest[src]

Auto Trait Implementations

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> DeserializeOwned for T where
    T: for<'de> Deserialize<'de>, 
[src]

impl<T> From<T> for T[src]

impl<T> Instrument for T[src]

impl<T> Instrument for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T> ToOwned for T where
    T: Clone
[src]

type Owned = T

The resulting type after obtaining ownership.

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.