providers_oauth2_list
GET/providers/oauth2/
OAuth2Provider Viewset
Request
Query Parameters
Possible values: [confidential
, public
]
Confidential clients are capable of maintaining the confidentiality of their credentials. Public clients are incapable
Possible values: [global
, per_provider
]
Configure how the issuer field of the ID Token should be filled.
Which field to use when ordering the results.
A page number within the paginated result set.
Number of results to return per page.
A search term.
Possible values: [hashed_user_id
, user_email
, user_id
, user_upn
, user_username
, user_uuid
]
Configure what data should be used as unique User Identifier. For most cases, the default should be fine.
Responses
- 200
- 400
- 403
- application/json
- Schema
- Example (from schema)
Schema
Array [
]
pagination
object
required
results
object[]
required
Flow used for authentication when the associated application is accessed by an un-authenticated user.
Flow used when authorizing this provider.
Get object component so that we know how to edit the object
Internal application name, used in URLs.
Application's display Name.
Internal application name, used in URLs.
Application's display Name.
Return object's verbose_name
Return object's plural verbose_name
Return internal model name
Confidential clients are capable of maintaining the confidentiality of their credentials. Public clients are incapable
Possible values: [confidential
, public
]
Possible values: <= 255 characters
Possible values: <= 255 characters
Access codes not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint.
Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
Enter each URI on a new line.
Configure what data should be used as unique User Identifier. For most cases, the default should be fine.
Possible values: [hashed_user_id
, user_id
, user_uuid
, user_username
, user_email
, user_upn
]
Configure how the issuer field of the ID Token should be filled.
Possible values: [global
, per_provider
]
{
"pagination": {
"next": 0,
"previous": 0,
"count": 0,
"current": 0,
"total_pages": 0,
"start_index": 0,
"end_index": 0
},
"results": [
{
"pk": 0,
"name": "string",
"authentication_flow": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"authorization_flow": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"property_mappings": [
"3fa85f64-5717-4562-b3fc-2c963f66afa6"
],
"component": "string",
"assigned_application_slug": "string",
"assigned_application_name": "string",
"assigned_backchannel_application_slug": "string",
"assigned_backchannel_application_name": "string",
"verbose_name": "string",
"verbose_name_plural": "string",
"meta_model_name": "string",
"client_id": "string",
"client_secret": "string",
"access_code_validity": "string",
"access_token_validity": "string",
"refresh_token_validity": "string",
"include_claims_in_id_token": true,
"signing_key": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"redirect_uris": "string",
"jwks_sources": [
"3fa85f64-5717-4562-b3fc-2c963f66afa6"
]
}
]
}
- application/json
- Schema
- Example (from schema)
Schema
Validation Error
{
"non_field_errors": [
"string"
],
"code": "string"
}
- application/json
- Schema
- Example (from schema)
Schema
{
"detail": "string",
"code": "string"
}