|
1 | 1 |
|
2 | 2 | export const clientTemplateClientCertificate = JSON.stringify({
|
3 |
| - clientId: '', |
4 |
| - name: '', |
5 |
| - description: '', |
6 |
| - surrogateAuthRequired: false, |
7 |
| - enabled: false, |
| 3 | + access: { view: true, configure: true, manage: true }, |
8 | 4 | alwaysDisplayInConsole: false,
|
9 |
| - clientAuthenticatorType: 'client-x509', |
10 |
| - redirectUris: ['http://*', 'https://*'], |
11 |
| - webOrigins: ['*'], |
12 |
| - notBefore: 0, |
13 |
| - bearerOnly: false, |
14 |
| - consentRequired: false, |
15 |
| - standardFlowEnabled: true, |
16 |
| - implicitFlowEnabled: false, |
17 |
| - directAccessGrantsEnabled: false, |
18 |
| - serviceAccountsEnabled: true, |
19 |
| - publicClient: false, |
20 |
| - frontchannelLogout: false, |
21 |
| - protocol: 'openid-connect', |
| 5 | + authenticationFlowBindingOverrides: {}, |
22 | 6 | attributes: {
|
23 |
| - "request.object.signature.alg": "any", |
24 |
| - "saml.multivalued.roles": "false", |
25 |
| - "saml.force.post.binding": "false", |
26 |
| - "oauth2.device.authorization.grant.enabled": "false", |
27 |
| - "backchannel.logout.revoke.offline.tokens": "false", |
28 |
| - "saml.server.signature.keyinfo.ext": "false", |
29 |
| - "use.refresh.tokens": "true", |
30 |
| - "realm_client": "false", |
31 |
| - "oidc.ciba.grant.enabled": "false", |
32 |
| - "backchannel.logout.session.required": "true", |
33 |
| - "client_credentials.use_refresh_token": "false", |
34 |
| - "saml.client.signature": "false", |
35 |
| - "require.pushed.authorization.requests": "false", |
36 |
| - "request.object.encryption.enc": "any", |
37 |
| - "dpop.bound.access.tokens": "false", |
38 |
| - "saml.assertion.signature": "false", |
39 |
| - "x509.subjectdn": "", |
| 7 | + "acr.loa.map": "{}", |
| 8 | + "access.token.header.type.rfc9068": false, |
| 9 | + "backchannel.logout.revoke.offline.tokens": false, |
| 10 | + "backchannel.logout.session.required": true, |
| 11 | + "client.introspection.response.allow.jwt.claim.enabled": false, |
| 12 | + "client.use.lightweight.access.token.enabled": false, |
| 13 | + "client_credentials.use_refresh_token": false, |
| 14 | + "display.on.consent.screen": false, |
| 15 | + "dpop.bound.access.tokens": false, |
| 16 | + "exclude.session.state.from.auth.response": false, |
| 17 | + "oauth2.device.authorization.grant.enabled": false, |
| 18 | + "oidc.ciba.grant.enabled": false, |
| 19 | + "realm_client": false, |
40 | 20 | "request.object.encryption.alg": "any",
|
41 |
| - "client.introspection.response.allow.jwt.claim.enabled": "false", |
42 |
| - "saml.encrypt": "false", |
43 |
| - "standard.token.exchange.enabled": "true", |
44 |
| - "saml.server.signature": "false", |
45 |
| - "exclude.session.state.from.auth.response": "false", |
46 |
| - "client.use.lightweight.access.token.enabled": "false", |
| 21 | + "request.object.encryption.enc": "any", |
47 | 22 | "request.object.required": "not required",
|
48 |
| - "saml_force_name_id_format": "false", |
49 |
| - "access.token.header.type.rfc9068": "false", |
50 |
| - "acr.loa.map": "{}", |
51 |
| - "tls.client.certificate.bound.access.tokens": "true", |
52 |
| - "saml.authnstatement": "false", |
53 |
| - "display.on.consent.screen": "false", |
54 |
| - "x509.allow.regex.pattern.comparison": "false", |
55 |
| - "token.response.type.bearer.lower-case": "false", |
56 |
| - "saml.onetimeuse.condition": "false" |
| 23 | + "request.object.signature.alg": "any", |
| 24 | + "require.pushed.authorization.requests": false, |
| 25 | + "saml.client.signature": false, |
| 26 | + "saml.encrypt": false, |
| 27 | + "saml.assertion.signature": false, |
| 28 | + "saml.authnstatement": false, |
| 29 | + "saml.force.post.binding": false, |
| 30 | + "saml.multivalued.roles": false, |
| 31 | + "saml.onetimeuse.condition": false, |
| 32 | + "saml.server.signature": false, |
| 33 | + "saml.server.signature.keyinfo.ext": false, |
| 34 | + "saml_force_name_id_format": false, |
| 35 | + "standard.token.exchange.enabled": true, |
| 36 | + "tls.client.certificate.bound.access.tokens": true, |
| 37 | + "token.response.type.bearer.lower-case": false, |
| 38 | + "use.refresh.tokens": true, |
| 39 | + "x509.allow.regex.pattern.comparison": false, |
| 40 | + "x509.subjectdn": "" |
57 | 41 | },
|
58 |
| - authenticationFlowBindingOverrides: {}, |
| 42 | + bearerOnly: false, |
| 43 | + clientAuthenticatorType: 'client-x509', |
| 44 | + clientId: '', |
| 45 | + consentRequired: false, |
| 46 | + defaultClientScopes: [] as string[], |
| 47 | + description: '', |
| 48 | + directAccessGrantsEnabled: false, |
| 49 | + enabled: false, |
| 50 | + frontchannelLogout: false, |
59 | 51 | fullScopeAllowed: false,
|
| 52 | + implicitFlowEnabled: false, |
| 53 | + name: '', |
60 | 54 | nodeReRegistrationTimeout: -1,
|
61 |
| - protocolMappers: [] as any[], |
62 |
| - defaultClientScopes: [] as string[], |
| 55 | + notBefore: 0, |
63 | 56 | optionalClientScopes: [] as string[],
|
64 |
| - access: { view: true, configure: true, manage: true }, |
| 57 | + protocol: 'openid-connect', |
| 58 | + protocolMappers: [] as any[], |
| 59 | + publicClient: false, |
| 60 | + redirectUris: ['http://*', 'https://*'], |
| 61 | + serviceAccountsEnabled: false, |
| 62 | + standardFlowEnabled: true, |
| 63 | + surrogateAuthRequired: false, |
| 64 | + webOrigins: ['*'], |
65 | 65 | });
|
0 commit comments