Skip to content

Latest commit

 

History

History
33 lines (28 loc) · 2.87 KB

LdapProvider.md

File metadata and controls

33 lines (28 loc) · 2.87 KB

LdapProvider

Properties

Name Type Description Notes
pk i32 [readonly]
name String
authentication_flow Option<uuid::Uuid> Flow used for authentication when the associated application is accessed by an un-authenticated user. [optional]
authorization_flow uuid::Uuid Flow used when authorizing this provider.
invalidation_flow uuid::Uuid Flow used ending the session from a provider.
property_mappings Option<Vecuuid::Uuid> [optional]
component String Get object component so that we know how to edit the object [readonly]
assigned_application_slug String Internal application name, used in URLs. [readonly]
assigned_application_name String Application's display Name. [readonly]
assigned_backchannel_application_slug String Internal application name, used in URLs. [readonly]
assigned_backchannel_application_name String Application's display Name. [readonly]
verbose_name String Return object's verbose_name [readonly]
verbose_name_plural String Return object's plural verbose_name [readonly]
meta_model_name String Return internal model name [readonly]
base_dn Option<String> DN under which objects are accessible. [optional]
certificate Option<uuid::Uuid> [optional]
tls_server_name Option<String> [optional]
uid_start_number Option<i32> The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber [optional]
gid_start_number Option<i32> The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber [optional]
outpost_set Vec [readonly]
search_mode Option<models::LdapapiAccessMode> [optional]
bind_mode Option<models::LdapapiAccessMode> [optional]
mfa_support Option<bool> When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. [optional]

[Back to Model list] [Back to API list] [Back to README]