Releases: goauthentik/client-go
v3.2023053.9
Update API Client
v3.2023053.8: Update API Client
What's New
POST
/core/users/{id}/impersonate/
GET
/core/users/impersonate_end/
What's Changed
GET
/admin/system/
Return Type:
Changed response : 200 OK
-
Changed content type :
application/json
New optional properties:
env
- Deleted property
env
(object)Get Environment
POST
/admin/system/
Return Type:
Changed response : 200 OK
-
Changed content type :
application/json
New optional properties:
env
- Deleted property
env
(object)Get Environment
v3.2023053.7
Update API Client
v3.2023053.6: Update API Client
What's Changed
GET
/outposts/ldap/{id}/
Return Type:
Changed response : 200 OK
-
Changed content type :
application/json
-
Added property
mfa_support
(boolean)When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
-
Changed property
uid_start_number
(integer)The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
-
Changed property
gid_start_number
(integer)The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
-
GET
/providers/ldap/{id}/
Return Type:
Changed response : 200 OK
-
Changed content type :
application/json
-
Added property
mfa_support
(boolean)When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
-
Changed property
uid_start_number
(integer)The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
-
Changed property
gid_start_number
(integer)The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
-
PUT
/providers/ldap/{id}/
Request:
Changed content type : application/json
-
Added property
mfa_support
(boolean)When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
-
Changed property
uid_start_number
(integer)The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
-
Changed property
gid_start_number
(integer)The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
Return Type:
Changed response : 200 OK
-
Changed content type :
application/json
-
Added property
mfa_support
(boolean)When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
-
Changed property
uid_start_number
(integer)The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
-
Changed property
gid_start_number
(integer)The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
-
PATCH
/providers/ldap/{id}/
Request:
Changed content type : application/json
-
Added property
mfa_support
(boolean)When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
-
Changed property
uid_start_number
(integer)The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
-
Changed property
gid_start_number
(integer)The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
Return Type:
Changed response : 200 OK
-
Changed content type :
application/json
-
Added property
mfa_support
(boolean)When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
-
Changed property
uid_start_number
(integer)The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
-
Changed property
gid_start_number
(integer)The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
-
GET
/outposts/ldap/
Return Type:
Changed response : 200 OK
-
Changed content type :
application/json
-
Changed property
results
(array)Changed items (object):
> LDAPProvider Serializer-
Added property
mfa_support
(boolean)When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
-
Changed property
uid_start_number
(integer)The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
-
Changed property
gid_start_number
(integer)The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
-
-
POST
/providers/ldap/
Request:
Changed content type : application/json
-
Added property
mfa_support
(boolean)When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
-
Changed property
uid_start_number
(integer)The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
-
Changed property
gid_start_number
(integer)The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
Return Type:
Changed response : 201 Created
-
Changed content type :
application/json
-
Added property
mfa_support
(boolean)When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
-
Changed property
uid_start_number
(integer)The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
-
Changed property
gid_start_number
(integer)The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
-
GET
/providers/ldap/
Return Type:
Changed response : 200 OK
-
Changed content type :
application/json
-
Changed property
results
(array)Changed items (object):
> LDAPProvider Serializer- Added property
mfa_support
(boolean)When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should onl...
- Added property
-
v3.2023053.5
Update API Client
v3.2023053.4
Update API Client
v3.2023053.3: Update API Client
What's New
GET
/admin/models/
What's Changed
GET
/policies/event_matcher/{policy_uuid}/
Return Type:
Changed response : 200 OK
-
Changed content type :
application/json
-
Added property
model
(object)Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched.
authentik_crypto.certificatekeypair
- Certificate-Key Pairauthentik_events.event
- Eventauthentik_events.notificationtransport
- Notification Transportauthentik_events.notification
- Notificationauthentik_events.notificationrule
- Notification Ruleauthentik_events.notificationwebhookmapping
- Webhook Mappingauthentik_flows.flow
- Flowauthentik_flows.flowstagebinding
- Flow Stage Bindingauthentik_outposts.dockerserviceconnection
- Docker Service-Connectionauthentik_outposts.kubernetesserviceconnection
- Kubernetes Service-Connectionauthentik_outposts.outpost
- outpostauthentik_policies_dummy.dummypolicy
- Dummy Policyauthentik_policies_event_matcher.eventmatcherpolicy
- Event Matcher Policyauthentik_policies_expiry.passwordexpirypolicy
- Password Expiry Policyauthentik_policies_expression.expressionpolicy
- Expression Policyauthentik_policies_password.passwordpolicy
- Password Policyauthentik_policies_reputation.reputationpolicy
- Reputation Policyauthentik_policies_reputation.reputation
- reputationauthentik_policies.policybinding
- Policy Bindingauthentik_providers_ldap.ldapprovider
- LDAP Providerauthentik_providers_oauth2.scopemapping
- Scope Mappingauthentik_providers_oauth2.oauth2provider
- OAuth2/OpenID Providerauthentik_providers_oauth2.authorizationcode
- Authorization Codeauthentik_providers_oauth2.accesstoken
- OAuth2 Access Tokenauthentik_providers_oauth2.refreshtoken
- OAuth2 Refresh Tokenauthentik_providers_proxy.proxyprovider
- Proxy Providerauthentik_providers_radius.radiusprovider
- Radius Providerauthentik_providers_saml.samlprovider
- SAML Providerauthentik_providers_saml.samlpropertymapping
- SAML Property Mappingauthentik_providers_scim.scimprovider
- SCIM Providerauthentik_providers_scim.scimmapping
- SCIM Mappingauthentik_sources_ldap.ldapsource
- LDAP Sourceauthentik_sources_ldap.ldappropertymapping
- LDAP Property Mappingauthentik_sources_oauth.oauthsource
- OAuth Sourceauthentik_sources_oauth.useroauthsourceconnection
- User OAuth Source Connectionauthentik_sources_plex.plexsource
- Plex Sourceauthentik_sources_plex.plexsourceconnection
- User Plex Source Connectionauthentik_sources_saml.samlsource
- SAML Sourceauthentik_sources_saml.usersamlsourceconnection
- User SAML Source Connectionauthentik_stages_authenticator_duo.authenticatorduostage
- Duo Authenticator Setup Stageauthentik_stages_authenticator_duo.duodevice
- Duo Deviceauthentik_stages_authenticator_sms.authenticatorsmsstage
- SMS Authenticator Setup Stageauthentik_stages_authenticator_sms.smsdevice
- SMS Deviceauthentik_stages_authenticator_static.authenticatorstaticstage
- Static Authenticator Stageauthentik_stages_authenticator_totp.authenticatortotpstage
- TOTP Authenticator Setup Stageauthentik_stages_authenticator_validate.authenticatorvalidatestage
- Authenticator Validation Stageauthentik_stages_authenticator_webauthn.authenticatewebauthnstage
- WebAuthn Authenticator Setup Stageauthentik_stages_authenticator_webauthn.webauthndevice
- WebAuthn Deviceauthentik_stages_captcha.captchastage
- Captcha Stageauthentik_stages_consent.consentstage
- Consent Stageauthentik_stages_consent.userconsent
- User Consentauthentik_stages_deny.denystage
- Deny Stageauthentik_stages_dummy.dummystage
- Dummy Stageauthentik_stages_email.emailstage
- Email Stageauthentik_stages_identification.identificationstage
- Identification Stageauthentik_stages_invitation.invitationstage
- Invitation Stageauthentik_stages_invitation.invitation
- Invitationauthentik_stages_password.passwordstage
- Password Stageauthentik_stages_prompt.prompt
- Promptauthentik_stages_prompt.promptstage
- Prompt Stageauthentik_stages_user_delete.userdeletestage
- User Delete Stageauthentik_stages_user_login.userloginstage
- User Login Stageauthentik_stages_user_logout.userlogoutstage
- User Logout Stageauthentik_stages_user_write.userwritestage
- User Write Stageauthentik_tenants.tenant
- Tenantauthentik_blueprints.blueprintinstance
- Blueprint Instanceauthentik_core.group
- groupauthentik_core.user
- Userauthentik_core.application
- Applicationauthentik_core.token
- Token
Enum values:
authentik_crypto.certificatekeypair
authentik_events.event
authentik_events.notificationtransport
authentik_events.notification
authentik_events.notificationrule
authentik_events.notificationwebhookmapping
authentik_flows.flow
authentik_flows.flowstagebinding
authentik_outposts.dockerserviceconnection
authentik_outposts.kubernetesserviceconnection
authentik_outposts.outpost
authentik_policies_dummy.dummypolicy
authentik_policies_event_matcher.eventmatcherpolicy
authentik_policies_expiry.passwordexpirypolicy
authentik_policies_expression.expressionpolicy
authentik_policies_password.passwordpolicy
authentik_policies_reputation.reputationpolicy
authentik_policies_reputation.reputation
authentik_policies.policybinding
authentik_providers_ldap.ldapprovider
authentik_providers_oauth2.scopemapping
authentik_providers_oauth2.oauth2provider
authentik_providers_oauth2.authorizationcode
authentik_providers_oauth2.accesstoken
authentik_providers_oauth2.refreshtoken
authentik_providers_proxy.proxyprovider
authentik_providers_radius.radiusprovider
authentik_providers_saml.samlprovider
authentik_providers_saml.samlpropertymapping
authentik_providers_scim.scimprovider
authentik_providers_scim.scimmapping
authentik_sources_ldap.ldapsource
authentik_sources_ldap.ldappropertymapping
authentik_sources_oauth.oauthsource
authentik_sources_oauth.useroauthsourceconnection
authentik_sources_plex.plexsource
authentik_sources_plex.plexsourceconnection
authentik_sources_saml.samlsource
authentik_sources_saml.usersamlsourceconnection
authentik_stages_authenticator_duo.authenticatorduostage
authentik_stages_authenticator_duo.duodevice
authentik_stages_authenticator_sms.authenticatorsmsstage
authentik_stages_authenticator_sms.smsdevice
authentik_stages_authenticator_static.authenticatorstaticstage
authentik_stages_authenticator_totp.authenticatortotpstage
authentik_stages_authenticator_validate.authenticatorvalidatestage
authentik_stages_authenticator_webauthn.authenticatewebauthnstage
authentik_stages_authenticator_webauthn.webauthndevice
authentik_stages_captcha.captchastage
authentik_stages_consent.consentstage
authentik_stages_consent.userconsent
authentik_stages_deny.denystage
authentik_stages_dummy.dummystage
authentik_stages_email.emailstage
authentik_stages_identification.identificationstage
authentik_stages_invitation.invitationstage
authentik_stages_invitation.invitation
authentik_stages_password.passwordstage
authentik_stages_prompt.prompt
authentik_stages_prompt.promptstage
authentik_stages_user_delete.userdeletestage
authentik_stages_user_login.userloginstage
authentik_stages_user_logout.userlogoutstage
authentik_stages_user_write.userwritestage
authentik_tenants.tenant
authentik_blueprints.blueprintinstance
authentik_core.group
authentik_core.user
authentik_core.application
authentik_core.token
-
PUT
/policies/event_matcher/{policy_uuid}/
Request:
Changed content type : application/json
- Added property
model
(object)Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched.
authentik_crypto.certificatekeypair
- Certificate-Key Pairauthentik_events.event
- Eventauthentik_events.notificationtransport
- Notification Transportauthentik_events.notification
- Notificationauthentik_events.notificationrule
- Notification Ruleauthentik_events.notificationwebhookmapping
- Webhook Mappingauthentik_flows.flow
- Flow- `authe...
v3.2023053.2: Update API Client
What's Changed
GET
/sources/ldap/{slug}/
Return Type:
Changed response : 200 OK
-
Changed content type :
application/json
-
Added property
client_certificate
(string)Client certificate to authenticate against the LDAP Server's Certificate.
-
Added property
sni
(boolean)
-
PUT
/sources/ldap/{slug}/
Request:
Changed content type : application/json
-
Added property
client_certificate
(string)Client certificate to authenticate against the LDAP Server's Certificate.
-
Added property
sni
(boolean)
Return Type:
Changed response : 200 OK
-
Changed content type :
application/json
-
Added property
client_certificate
(string)Client certificate to authenticate against the LDAP Server's Certificate.
-
Added property
sni
(boolean)
-
PATCH
/sources/ldap/{slug}/
Request:
Changed content type : application/json
-
Added property
client_certificate
(string)Client certificate to authenticate against the LDAP Server's Certificate.
-
Added property
sni
(boolean)
Return Type:
Changed response : 200 OK
-
Changed content type :
application/json
-
Added property
client_certificate
(string)Client certificate to authenticate against the LDAP Server's Certificate.
-
Added property
sni
(boolean)
-
POST
/sources/ldap/
Request:
Changed content type : application/json
-
Added property
client_certificate
(string)Client certificate to authenticate against the LDAP Server's Certificate.
-
Added property
sni
(boolean)
Return Type:
Changed response : 201 Created
-
Changed content type :
application/json
-
Added property
client_certificate
(string)Client certificate to authenticate against the LDAP Server's Certificate.
-
Added property
sni
(boolean)
-
GET
/sources/ldap/
Parameters:
Added: client_certificate
in query
Added: sni
in query
Return Type:
Changed response : 200 OK
-
Changed content type :
application/json
-
Changed property
results
(array)Changed items (object):
> LDAP Source Serializer-
Added property
client_certificate
(string)Client certificate to authenticate against the LDAP Server's Certificate.
-
Added property
sni
(boolean)
-
-
v3.2023053.1
Update API Client
v3.2023052.1
Update API Client