Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
31 changes: 31 additions & 0 deletions docs/ActiveDirectoryApplication.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
# ActiveDirectoryApplication

Active Directory application for directory integrations. This application type has a null signOnMode.

## Properties

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**name** | **str** | Unique key for the Active Directory app definition. Always 'active_directory' for AD apps. | [optional] [readonly]
**settings** | [**ActiveDirectoryApplicationSettings**](ActiveDirectoryApplicationSettings.md) | | [optional]

## Example

```python
from okta.models.active_directory_application import ActiveDirectoryApplication

# TODO update the JSON string below
json = "{}"
# create an instance of ActiveDirectoryApplication from a JSON string
active_directory_application_instance = ActiveDirectoryApplication.from_json(json)
# print the JSON string representation of the object
print(ActiveDirectoryApplication.to_json())

# convert the object into a dict
active_directory_application_dict = active_directory_application_instance.to_dict()
# create an instance of ActiveDirectoryApplication from a dict
active_directory_application_from_dict = ActiveDirectoryApplication.from_dict(active_directory_application_dict)
```
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)


36 changes: 36 additions & 0 deletions docs/ActiveDirectoryApplicationSettings.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
# ActiveDirectoryApplicationSettings

Settings for Active Directory applications

## Properties

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**em_opt_in_status** | **str** | The entitlement management opt-in status for the app | [optional] [readonly]
**identity_store_id** | **str** | Identifies an additional identity store app, if your app supports it. The `identityStoreId` value must be a valid identity store app ID. This identity store app must be created in the same org as your app. | [optional]
**implicit_assignment** | **bool** | Controls whether Okta automatically assigns users to the app based on the user's role or group membership. | [optional]
**inline_hook_id** | **str** | Identifier of an inline hook. Inline hooks are outbound calls from Okta to your own custom code, triggered at specific points in Okta process flows. They allow you to integrate custom functionality into those flows. See [Inline hooks](/openapi/okta-management/management/tag/InlineHook/). | [optional]
**notes** | [**ApplicationSettingsNotes**](ApplicationSettingsNotes.md) | | [optional]
**notifications** | [**ApplicationSettingsNotifications**](ApplicationSettingsNotifications.md) | | [optional]
**app** | [**ActiveDirectoryApplicationSettingsApplication**](ActiveDirectoryApplicationSettingsApplication.md) | | [optional]

## Example

```python
from okta.models.active_directory_application_settings import ActiveDirectoryApplicationSettings

# TODO update the JSON string below
json = "{}"
# create an instance of ActiveDirectoryApplicationSettings from a JSON string
active_directory_application_settings_instance = ActiveDirectoryApplicationSettings.from_json(json)
# print the JSON string representation of the object
print(ActiveDirectoryApplicationSettings.to_json())

# convert the object into a dict
active_directory_application_settings_dict = active_directory_application_settings_instance.to_dict()
# create an instance of ActiveDirectoryApplicationSettings from a dict
active_directory_application_settings_from_dict = ActiveDirectoryApplicationSettings.from_dict(active_directory_application_settings_dict)
```
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)


37 changes: 37 additions & 0 deletions docs/ActiveDirectoryApplicationSettingsApplication.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
# ActiveDirectoryApplicationSettingsApplication

App-specific settings for Active Directory applications

## Properties

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**activation_email** | **str** | Email address to send activation emails | [optional]
**filter_groups_by_ou** | **bool** | Whether to filter groups by organizational unit | [optional]
**jit_groups_across_domains** | **bool** | Whether to enable just-in-time provisioning of groups across domains | [optional]
**login** | **str** | Login username for AD connection | [optional]
**naming_context** | **str** | The AD domain naming context (e.g., 'corp.local') | [optional]
**password** | **str** | Password for AD connection | [optional]
**scan_rate** | **int** | Rate at which to scan the AD directory | [optional]
**search_org_unit** | **str** | Organizational unit to search within | [optional]

## Example

```python
from okta.models.active_directory_application_settings_application import ActiveDirectoryApplicationSettingsApplication

# TODO update the JSON string below
json = "{}"
# create an instance of ActiveDirectoryApplicationSettingsApplication from a JSON string
active_directory_application_settings_application_instance = ActiveDirectoryApplicationSettingsApplication.from_json(json)
# print the JSON string representation of the object
print(ActiveDirectoryApplicationSettingsApplication.to_json())

# convert the object into a dict
active_directory_application_settings_application_dict = active_directory_application_settings_application_instance.to_dict()
# create an instance of ActiveDirectoryApplicationSettingsApplication from a dict
active_directory_application_settings_application_from_dict = ActiveDirectoryApplicationSettingsApplication.from_dict(active_directory_application_settings_application_dict)
```
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)


2 changes: 1 addition & 1 deletion docs/Application.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ Name | Type | Description | Notes
**licensing** | [**ApplicationLicensing**](ApplicationLicensing.md) | | [optional]
**orn** | **str** | The Okta resource name (ORN) for the current app instance | [optional] [readonly]
**profile** | **Dict[str, object]** | Contains any valid JSON schema for specifying properties that can be referenced from a request (only available to OAuth 2.0 client apps). For example, add an app manager contact email address or define an allowlist of groups that you can then reference using the Okta Expression Language `getFilteredGroups` function. > **Notes:** > * `profile` isn't encrypted, so don't store sensitive data in it. > * `profile` doesn't limit the level of nesting in the JSON schema you created, but there is a practical size limit. Okta recommends a JSON schema size of 1 MB or less for best performance. | [optional]
**sign_on_mode** | [**ApplicationSignOnMode**](ApplicationSignOnMode.md) | |
**sign_on_mode** | [**ApplicationSignOnMode**](ApplicationSignOnMode.md) | | [optional]
**status** | [**ApplicationLifecycleStatus**](ApplicationLifecycleStatus.md) | | [optional]
**universal_logout** | [**ApplicationUniversalLogout**](ApplicationUniversalLogout.md) | | [optional]
**visibility** | [**ApplicationVisibility**](ApplicationVisibility.md) | | [optional]
Expand Down
2 changes: 1 addition & 1 deletion docs/ApplicationSignOnMode.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# ApplicationSignOnMode

Authentication mode for the app | signOnMode | Description | | ---------- | ----------- | | AUTO_LOGIN | Secure Web Authentication (SWA) | | BASIC_AUTH | HTTP Basic Authentication with Okta Browser Plugin | | BOOKMARK | Just a bookmark (no-authentication) | | BROWSER_PLUGIN | Secure Web Authentication (SWA) with Okta Browser Plugin | | OPENID_CONNECT | Federated Authentication with OpenID Connect (OIDC) | | SAML_1_1 | Federated Authentication with SAML 1.1 WebSSO (not supported for custom apps) | | SAML_2_0 | Federated Authentication with SAML 2.0 WebSSO | | SECURE_PASSWORD_STORE | Secure Web Authentication (SWA) with POST (plugin not required) | | WS_FEDERATION | Federated Authentication with WS-Federation Passive Requestor Profile | | MFA_AS_SERVICE | Application to use Okta's MFA as a service for RDP | Select the `signOnMode` for your custom app:
Authentication mode for the app | signOnMode | Description | | ---------- | ----------- | | AUTO_LOGIN | Secure Web Authentication (SWA) | | BASIC_AUTH | HTTP Basic Authentication with Okta Browser Plugin | | BOOKMARK | Just a bookmark (no-authentication) | | BROWSER_PLUGIN | Secure Web Authentication (SWA) with Okta Browser Plugin | | OPENID_CONNECT | Federated Authentication with OpenID Connect (OIDC) | | SAML_1_1 | Federated Authentication with SAML 1.1 WebSSO (not supported for custom apps) | | SAML_2_0 | Federated Authentication with SAML 2.0 WebSSO | | SECURE_PASSWORD_STORE | Secure Web Authentication (SWA) with POST (plugin not required) | | WS_FEDERATION | Federated Authentication with WS-Federation Passive Requestor Profile | Select the `signOnMode` for your custom app:

## Properties

Expand Down
3 changes: 3 additions & 0 deletions okta/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -191,6 +191,9 @@
"ActionProviderPayloadType": "okta.models.action_provider_payload_type",
"ActionProviderType": "okta.models.action_provider_type",
"Actions": "okta.models.actions",
"ActiveDirectoryApplication": "okta.models.active_directory_application",
"ActiveDirectoryApplicationSettings": "okta.models.active_directory_application_settings",
"ActiveDirectoryApplicationSettingsApplication": "okta.models.active_directory_application_settings_application",
"ActiveDirectoryGroupScope": "okta.models.active_directory_group_scope",
"ActiveDirectoryGroupType": "okta.models.active_directory_group_type",
"AddGroupRequest": "okta.models.add_group_request",
Expand Down
4 changes: 4 additions & 0 deletions okta/models/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,7 @@
'AppConfigActiveDirectory',
],
'application': [
'ActiveDirectoryApplication',
'Application',
'AutoLoginApplication',
'BasicAuthApplication',
Expand Down Expand Up @@ -391,6 +392,9 @@
"ActionProviderPayloadType": "okta.models.action_provider_payload_type",
"ActionProviderType": "okta.models.action_provider_type",
"Actions": "okta.models.actions",
"ActiveDirectoryApplication": "okta.models.active_directory_application",
"ActiveDirectoryApplicationSettings": "okta.models.active_directory_application_settings",
"ActiveDirectoryApplicationSettingsApplication": "okta.models.active_directory_application_settings_application",
"ActiveDirectoryGroupScope": "okta.models.active_directory_group_scope",
"ActiveDirectoryGroupType": "okta.models.active_directory_group_type",
"AddGroupRequest": "okta.models.add_group_request",
Expand Down
2 changes: 1 addition & 1 deletion okta/models/action_provider.py
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ class ActionProvider(BaseModel):
@classmethod
def get_discriminator_value(cls, obj: Dict[str, Any]) -> Optional[str]:
"""Returns the discriminator value (object type) of the data"""
discriminator_value = obj[cls.__discriminator_property_name]
discriminator_value = obj.get(cls.__discriminator_property_name)
if discriminator_value:
return cls.__discriminator_value_class_map.get(discriminator_value)
else:
Expand Down
Loading
Loading