Skip to content

Latest commit

 

History

History
31 lines (27 loc) · 3.15 KB

AuthMethodCreateOauth2.md

File metadata and controls

31 lines (27 loc) · 3.15 KB

akeyless.AuthMethodCreateOauth2

Properties

Name Type Description Notes
accessExpires Number Access expiration date in Unix timestamp (select 0 for access without expiry date) [optional] [default to 0]
audience String The audience in the JWT [optional]
auditLogsClaims [String] Subclaims to include in audit logs, e.g "--audit-logs-claims email --audit-logs-claims username" [optional]
boundClientIds [String] The clients ids that the access is restricted to [optional]
boundIps [String] A CIDR whitelist with the IPs that the access is restricted to [optional]
cert String CertificateFile Path to a file that contain the certificate in a PEM format. [optional]
certFileData String CertificateFileData PEM Certificate in a Base64 format. [optional]
deleteProtection String Protection from accidental deletion of this object [true/false] [optional]
description String Auth Method description [optional]
forceSubClaims Boolean if true: enforce role-association must include sub claims [optional]
gatewayUrl String Akeyless Gateway URL (Configuration Management port). Relevant only when the jwks-uri is accessible only from the gateway. [optional]
gwBoundIps [String] A CIDR whitelist with the GW IPs that the access is restricted to [optional]
issuer String Issuer URL [optional]
json Boolean Set output format to JSON [optional] [default to false]
jwksJsonData String The JSON Web Key Set (JWKS) that containing the public keys that should be used to verify any JSON Web Token (JWT) issued by the authorization server. base64 encoded string [optional]
jwksUri String The URL to the JSON Web Key Set (JWKS) that containing the public keys that should be used to verify any JSON Web Token (JWT) issued by the authorization server. [default to 'default_jwks_url']
jwtTtl Number Jwt TTL [optional] [default to 0]
name String Auth Method name
productType [String] Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] [optional]
subclaimsDelimiters [String] A list of additional sub claims delimiters (relevant only for SAML, OIDC, OAuth2/JWT) [optional]
token String Authentication token (see `/auth` and `/configure`) [optional]
uidToken String The universal identity token, Required only for universal_identity authentication [optional]
uniqueIdentifier String A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a "sub claim" that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.