赛派号

48v24ah锂电池重量多少 Authentication Providers

List authentication providers AuthenticationProvidersController#index GET /api/v1/accounts/:account_id/authentication_providers Scope: url:GET|/api/v1/accounts/:account_id/authentication_providers

Returns a paginated list of authentication providers

Example Request: curl 'https:///api/v1/accounts//authentication_providers' \ -H 'Authorization: Bearer ' Returns a list of AuthenticationProvider objects Get authentication provider AuthenticationProvidersController#show GET /api/v1/accounts/:account_id/authentication_providers/:id Scope: url:GET|/api/v1/accounts/:account_id/authentication_providers/:id

Get the specified authentication provider

Example Request: curl 'https:///api/v1/accounts//authentication_providers/' \ -H 'Authorization: Bearer ' Returns an AuthenticationProvider object Add authentication provider AuthenticationProvidersController#create POST /api/v1/accounts/:account_id/authentication_providers Scope: url:POST|/api/v1/accounts/:account_id/authentication_providers

Add external authentication provider(s) for the account. Services may be Apple, CAS, Facebook, GitHub, Google, LDAP, LinkedIn, Microsoft, OpenID Connect, or SAML.

Each authentication provider is specified as a set of parameters as described below. A provider specification must include an ‘auth_type’ parameter with a value of ‘apple’, ‘canvas’, ‘cas’, ‘clever’, ‘facebook’, ‘github’, ‘google’, ‘ldap’, ‘linkedin’, ‘microsoft’, ‘openid_connect’, or ‘saml’. The other recognized parameters depend on this auth_type; unrecognized parameters are discarded. Provider specifications not specifying a valid auth_type are ignored.

You can set the ‘position’ for any provider. The config in the 1st position is considered the default. You can set ‘jit_provisioning’ for any provider besides Canvas. You can set ‘mfa_required’ for any provider.

For Apple, the additional recognized parameters are:

client_id [Required]

The developer’s client identifier, as provided by WWDR. Not ailable if configured globally for Canvas.

login_attribute [Optional]

The attribute to use to look up the user’s login in Canvas. Either ‘sub’ (the default), or ‘email’

federated_attributes [Optional]

See FederatedAttributesConfig. Valid provider attributes are ‘email’, ‘firstName’, ‘lastName’, and ‘sub’.

For Canvas, the additional recognized parameter is:

self_registration

‘all’, ‘none’, or ‘observer’ - who is allowed to register as a new user

For CAS, the additional recognized parameters are:

auth_base

The CAS server’s URL.

log_in_url [Optional]

An alternate SSO URL for logging into CAS. You probably should not set this.

For Clever, the additional recognized parameters are:

client_id [Required]

The Clever application’s Client ID. Not ailable if configured globally for Canvas.

client_secret [Required]

The Clever application’s Client Secret. Not ailable if configured globally for Canvas.

district_id [Optional]

A district’s Clever ID. Lee this blank to let Clever handle the details with its District Picker. This is required for Clever Instant Login to work in a multi-tenant environment.

login_attribute [Optional]

The attribute to use to look up the user’s login in Canvas. Either ‘id’ (the default), ‘sis_id’, ‘email’, ‘student_number’, or ‘teacher_number’. Note that some fields may not be populated for all users at Clever.

federated_attributes [Optional]

See FederatedAttributesConfig. Valid provider attributes are ‘id’, ‘sis_id’, ‘email’, ‘student_number’, and ‘teacher_number’.

For Facebook, the additional recognized parameters are:

app_id [Required]

The Facebook App ID. Not ailable if configured globally for Canvas.

app_secret [Required]

The Facebook App Secret. Not ailable if configured globally for Canvas.

login_attribute [Optional]

The attribute to use to look up the user’s login in Canvas. Either ‘id’ (the default), or ‘email’

federated_attributes [Optional]

See FederatedAttributesConfig. Valid provider attributes are ‘email’, ‘first_name’, ‘id’, ‘last_name’, ‘locale’, and ‘name’.

For GitHub, the additional recognized parameters are:

domain [Optional]

The domain of a GitHub Enterprise installation. I.e. github.mycompany.com. If not set, it will default to the public github.com.

client_id [Required]

The GitHub application’s Client ID. Not ailable if configured globally for Canvas.

client_secret [Required]

The GitHub application’s Client Secret. Not ailable if configured globally for Canvas.

login_attribute [Optional]

The attribute to use to look up the user’s login in Canvas. Either ‘id’ (the default), or ‘login’

federated_attributes [Optional]

See FederatedAttributesConfig. Valid provider attributes are ‘email’, ‘id’, ‘login’, and ‘name’.

For Google, the additional recognized parameters are:

client_id [Required]

The Google application’s Client ID. Not ailable if configured globally for Canvas.

client_secret [Required]

The Google application’s Client Secret. Not ailable if configured globally for Canvas.

hosted_domain [Optional]

A Google Apps domain to restrict logins to. See developers.google.com/identity/protocols/OpenIDConnect?hl=en#hd-param

login_attribute [Optional]

The attribute to use to look up the user’s login in Canvas. Either ‘sub’ (the default), or ‘email’

federated_attributes [Optional]

See FederatedAttributesConfig. Valid provider attributes are ‘email’, ‘family_name’, ‘given_name’, ‘locale’, ‘name’, and ‘sub’.

For LDAP, the additional recognized parameters are:

auth_host

The LDAP server’s URL.

auth_port [Optional, Integer]

The LDAP server’s TCP port. (default: 389)

auth_over_tls [Optional]

Whether to use TLS. Can be ‘simple_tls’, or ‘start_tls’. For backwards compatibility, booleans are also accepted, with true meaning simple_tls. If not provided, it will default to start_tls.

auth_base [Optional]

A default treebase parameter for searches performed against the LDAP server.

auth_filter

LDAP search filter. Use {{login}} as a placeholder for the username supplied by the user. For example: “(sAMAccountName={{login}})”.

identifier_format [Optional]

The LDAP attribute to use to look up the Canvas login. Omit to use the username supplied by the user.

auth_username

Username

auth_password

Password

For LinkedIn, the additional recognized parameters are:

client_id [Required]

The LinkedIn application’s Client ID. Not ailable if configured globally for Canvas.

client_secret [Required]

The LinkedIn application’s Client Secret. Not ailable if configured globally for Canvas.

login_attribute [Optional]

The attribute to use to look up the user’s login in Canvas. Either ‘id’ (the default), or ‘emailAddress’

federated_attributes [Optional]

See FederatedAttributesConfig. Valid provider attributes are ‘emailAddress’, ‘firstName’, ‘id’, ‘formattedName’, and ‘lastName’.

For Microsoft, the additional recognized parameters are:

application_id [Required]

The application’s ID.

application_secret [Required]

The application’s Client Secret (Password)

tenant [Optional]

See azure.microsoft.com/en-us/documentation/articles/active-directory-v2-protocols/ Valid values are ‘common’, ‘organizations’, ‘consumers’, or an Azure Active Directory Tenant (as either a UUID or domain, such as contoso.onmicrosoft.com). Defaults to ‘common’

login_attribute [Optional]

See azure.microsoft.com/en-us/documentation/articles/active-directory-v2-tokens/#idtokens Valid values are ‘sub’, ‘email’, ‘oid’, or ‘preferred_username’. Note that email may not always be populated in the user’s profile at Microsoft. Oid will not be populated for personal Microsoft accounts. Defaults to ‘sub’

federated_attributes [Optional]

See FederatedAttributesConfig. Valid provider attributes are ‘email’, ‘name’, ‘preferred_username’, ‘oid’, and ‘sub’.

For OpenID Connect, the additional recognized parameters are:

client_id [Required]

The application’s Client ID.

client_secret [Required]

The application’s Client Secret.

authorize_url [Required]

The URL for getting starting the OAuth 2.0 web flow

token_url [Required]

The URL for exchanging the OAuth 2.0 authorization code for an Access Token and ID Token

scope [Optional]

Space separated additional scopes to request for the token. Note that you need not specify the ‘openid’ scope, or any scopes that can be automatically inferred by the rules defined at openid.net/specs/openid-connect-core-1_0.html#ScopeClaims

end_session_endpoint [Optional]

URL to send the end user to after logging out of Canvas. See openid.net/specs/openid-connect-session-1_0.html#RPLogout

userinfo_endpoint [Optional]

URL to request additional claims from. If the initial ID Token received from the provider cannot be used to satisfy the login_attribute and all federated_attributes, this endpoint will be queried for additional information.

login_attribute [Optional]

The attribute of the ID Token to look up the user’s login in Canvas. Defaults to ‘sub’.

federated_attributes [Optional]

See FederatedAttributesConfig. Any value is allowed for the provider attribute names, but standard claims are listed at openid.net/specs/openid-connect-core-1_0.html#StandardClaims

For SAML, the additional recognized parameters are:

metadata [Optional]

An XML document to parse as SAML metadata, and automatically populate idp_entity_id, log_in_url, log_out_url, certificate_fingerprint, and identifier_format

metadata_uri [Optional]

A URI to download the SAML metadata from, and automatically populate idp_entity_id, log_in_url, log_out_url, certificate_fingerprint, and identifier_format. This URI will also be sed, and the metadata periodically refreshed, automatically. If the metadata contains multiple entities, also supply idp_entity_id to distinguish which one you want (otherwise the only entity in the metadata will be inferred). If you provide the URI ‘urn:mace:incommon’ or ‘ukfederation.org.uk’, the InCommon or UK Access Management Federation metadata aggregate, respectively, will be used instead, and additional validation checks will happen (including validating that the metadata has been properly signed with the appropriate key).

idp_entity_id

The SAML IdP’s entity ID

log_in_url

The SAML service’s SSO target URL

log_out_url [Optional]

The SAML service’s SLO target URL

certificate_fingerprint

The SAML service’s certificate fingerprint.

identifier_format

The SAML service’s identifier format. Must be one of:

urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress

urn:oasis:names:tc:SAML:2.0:nameid-format:entity

urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos

urn:oasis:names:tc:SAML:2.0:nameid-format:persistent

urn:oasis:names:tc:SAML:2.0:nameid-format:transient

urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified

urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName

urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName

requested_authn_context [Optional]

The SAML AuthnContext

sig_alg [Optional]

If set, AuthnRequest, LogoutRequest, and LogoutResponse messages are signed with the corresponding algorithm. Supported algorithms are:

http://www.w3.org/2000/09/xmldsig#rsa-sha1

http://www.w3.org/2001/04/xmldsig-more#rsa-sha256

RSA-SHA1 and RSA-SHA256 are acceptable aliases.

federated_attributes [Optional]

See FederatedAttributesConfig. Any value is allowed for the provider attribute names.

Example Request: # Create LDAP config curl 'https:///api/v1/accounts//authentication_providers' \ -F 'auth_type=ldap' \ -F 'auth_host=ldap.mydomain.edu' \ -F 'auth_filter=(sAMAccountName={{login}})' \ -F 'auth_username=username' \ -F 'auth_password=bestpasswordever' \ -F 'position=1' \ -H 'Authorization: Bearer ' # Create SAML config curl 'https:///api/v1/accounts//authentication_providers' \ -F 'auth_type=saml' \ -F 'idp_entity_id=' \ -F 'log_in_url=' \ -F 'log_out_url=' \ -F 'certificate_fingerprint=' \ -H 'Authorization: Bearer ' # Create CAS config curl 'https:///api/v1/accounts//authentication_providers' \ -F 'auth_type=cas' \ -F 'auth_base=cas.mydomain.edu' \ -F 'log_in_url=' \ -H 'Authorization: Bearer ' Returns an AuthenticationProvider object Update authentication provider AuthenticationProvidersController#update PUT /api/v1/accounts/:account_id/authentication_providers/:id Scope: url:PUT|/api/v1/accounts/:account_id/authentication_providers/:id

Update an authentication provider using the same options as the Add authentication provider endpoint. You cannot update an existing provider to a new authentication type.

Example Request: # update SAML config curl -X PUT 'https:///api/v1/accounts//authentication_providers/' \ -F 'idp_entity_id=' \ -F 'log_in_url=' \ -H 'Authorization: Bearer ' Returns an AuthenticationProvider object Delete authentication provider AuthenticationProvidersController#destroy DELETE /api/v1/accounts/:account_id/authentication_providers/:id Scope: url:DELETE|/api/v1/accounts/:account_id/authentication_providers/:id

Delete the config

Example Request: curl -X DELETE 'https:///api/v1/accounts//authentication_providers/' \ -H 'Authorization: Bearer ' Restore a deleted authentication provider AuthenticationProvidersController#restore PUT /api/v1/accounts/:account_id/authentication_providers/:id/restore Scope: url:PUT|/api/v1/accounts/:account_id/authentication_providers/:id/restore

Restore an authentication provider back to active that was previously deleted. Only ailable to admins who can manage_account_settings for given root account.

Example Request: curl -X PUT 'https:///api/v1/accounts//authentication_providers//restore' \ -H 'Authorization: Bearer ' Returns an AuthenticationProvider object Show account auth settings AuthenticationProvidersController#show_sso_settings GET /api/v1/accounts/:account_id/sso_settings Scope: url:GET|/api/v1/accounts/:account_id/sso_settings

The way to get the current state of each account level setting that’s relevant to Single Sign On configuration

You can list the current state of each setting with “update_sso_settings”

Example Request: curl -XGET 'https:///api/v1/accounts//sso_settings' \ -H 'Authorization: Bearer ' Returns a SSOSettings object Update account auth settings AuthenticationProvidersController#update_sso_settings PUT /api/v1/accounts/:account_id/sso_settings Scope: url:PUT|/api/v1/accounts/:account_id/sso_settings

For various cases of mixed SSO configurations, you may need to set some configuration at the account level to handle the particulars of your setup.

This endpoint accepts a PUT request to set several possible account settings. All setting are optional on each request, any that are not provided at all are simply retained as is. Any that provide the key but a null-ish value (blank string, null, undefined) will be UN-set.

You can list the current state of each setting with “show_sso_settings”

Example Request: curl -XPUT 'https:///api/v1/accounts//sso_settings' \ -F 'sso_settings[auth_discovery_url]=' \ -F 'sso_settings[change_password_url]=' \ -F 'sso_settings[login_handle_name]=' \ -H 'Authorization: Bearer ' Returns a SSOSettings object

版权声明:本文内容由互联网用户自发贡献,该文观点仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容, 请发送邮件至lsinopec@gmail.com举报,一经查实,本站将立刻删除。

上一篇 没有了

下一篇没有了