providers_oauth2_create
POST/providers/oauth2/
OAuth2Provider Viewset
Request
- application/json
Body
required
Possible values: non-empty
Flow used for authentication when the associated application is accessed by an un-authenticated user.
Flow used when authorizing this provider.
Confidential clients are capable of maintaining the confidentiality of their credentials. Public clients are incapable
Possible values: [confidential
, public
]
Possible values: non-empty
and <= 255 characters
Possible values: <= 255 characters
Access codes not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
Possible values: non-empty
Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
Possible values: non-empty
Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
Possible values: non-empty
Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint.
Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
Enter each URI on a new line.
Configure what data should be used as unique User Identifier. For most cases, the default should be fine.
Possible values: [hashed_user_id
, user_id
, user_uuid
, user_username
, user_email
, user_upn
]
Configure how the issuer field of the ID Token should be filled.
Possible values: [global
, per_provider
]
Responses
- 201
- 400
- 403
- application/json
- Schema
- Example (from schema)
Schema
Flow used for authentication when the associated application is accessed by an un-authenticated user.
Flow used when authorizing this provider.
Get object component so that we know how to edit the object
Internal application name, used in URLs.
Application's display Name.
Internal application name, used in URLs.
Application's display Name.
Return object's verbose_name
Return object's plural verbose_name
Return internal model name
Confidential clients are capable of maintaining the confidentiality of their credentials. Public clients are incapable
Possible values: [confidential
, public
]
Possible values: <= 255 characters
Possible values: <= 255 characters
Access codes not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint.
Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
Enter each URI on a new line.
Configure what data should be used as unique User Identifier. For most cases, the default should be fine.
Possible values: [hashed_user_id
, user_id
, user_uuid
, user_username
, user_email
, user_upn
]
Configure how the issuer field of the ID Token should be filled.
Possible values: [global
, per_provider
]
{
"pk": 0,
"name": "string",
"authentication_flow": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"authorization_flow": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"property_mappings": [
"3fa85f64-5717-4562-b3fc-2c963f66afa6"
],
"component": "string",
"assigned_application_slug": "string",
"assigned_application_name": "string",
"assigned_backchannel_application_slug": "string",
"assigned_backchannel_application_name": "string",
"verbose_name": "string",
"verbose_name_plural": "string",
"meta_model_name": "string",
"client_id": "string",
"client_secret": "string",
"access_code_validity": "string",
"access_token_validity": "string",
"refresh_token_validity": "string",
"include_claims_in_id_token": true,
"signing_key": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"redirect_uris": "string",
"jwks_sources": [
"3fa85f64-5717-4562-b3fc-2c963f66afa6"
]
}
- application/json
- Schema
- Example (from schema)
Schema
Validation Error
{
"non_field_errors": [
"string"
],
"code": "string"
}
- application/json
- Schema
- Example (from schema)
Schema
{
"detail": "string",
"code": "string"
}