You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Apr 17, 2024. It is now read-only.
#### What's Changed
---
##### `GET` /outposts/radius/{id}/
###### Return Type:
Changed response : **200 OK**
* Changed content type : `application/json`
* Added property `mfa_support` (boolean)
> When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
##### `GET` /providers/radius/{id}/
###### Return Type:
Changed response : **200 OK**
* Changed content type : `application/json`
* Added property `mfa_support` (boolean)
> When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
##### `PUT` /providers/radius/{id}/
###### Request:
Changed content type : `application/json`
* Added property `mfa_support` (boolean)
> When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
###### Return Type:
Changed response : **200 OK**
* Changed content type : `application/json`
* Added property `mfa_support` (boolean)
> When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
##### `PATCH` /providers/radius/{id}/
###### Request:
Changed content type : `application/json`
* Added property `mfa_support` (boolean)
> When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
###### Return Type:
Changed response : **200 OK**
* Changed content type : `application/json`
* Added property `mfa_support` (boolean)
> When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
##### `GET` /outposts/radius/
###### Return Type:
Changed response : **200 OK**
* Changed content type : `application/json`
* Changed property `results` (array)
Changed items (object):
> RadiusProvider Serializer
* Added property `mfa_support` (boolean)
> When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
##### `POST` /providers/radius/
###### Request:
Changed content type : `application/json`
* Added property `mfa_support` (boolean)
> When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
###### Return Type:
Changed response : **201 Created**
* Changed content type : `application/json`
* Added property `mfa_support` (boolean)
> When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
##### `GET` /providers/radius/
###### Return Type:
Changed response : **200 OK**
* Changed content type : `application/json`
* Changed property `results` (array)
Changed items (object):
> RadiusProvider Serializer
* Added property `mfa_support` (boolean)
> When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
##### `PUT` /core/transactional/applications/
###### Request:
Changed content type : `application/json`
* Changed property `provider` (object)
Updated `authentik_providers_radius.radiusprovider` provider_model:
* Added property `mfa_support` (boolean)
> When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
/** Shared secret between clients and server to hash packets. */
25
25
publicvarsharedSecret:String?
26
+
/** When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. */
/** Shared secret between clients and server to hash packets. */
23
23
publicvarsharedSecret:String?
24
+
/** When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. */
/** Shared secret between clients and server to hash packets. */
42
42
publicvarsharedSecret:String?
43
43
publicvaroutpostSet:[String]
44
+
/** When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. */
/** Shared secret between clients and server to hash packets. */
25
25
publicvarsharedSecret:String?
26
+
/** When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. */
Copy file name to clipboardexpand all lines: docs/PatchedRadiusProviderRequest.md
+1
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,7 @@ Name | Type | Description | Notes
9
9
**propertyMappings** | **[UUID]** | | [optional]
10
10
**clientNetworks** | **String** | List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped. | [optional]
11
11
**sharedSecret** | **String** | Shared secret between clients and server to hash packets. | [optional]
12
+
**mfaSupport** | **Bool** | When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. | [optional]
12
13
13
14
[[Back to Model list]](../README.md#documentation-for-models)[[Back to API list]](../README.md#documentation-for-api-endpoints)[[Back to README]](../README.md)
Copy file name to clipboardexpand all lines: docs/RadiusOutpostConfig.md
+1
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,7 @@ Name | Type | Description | Notes
9
9
**authFlowSlug** | **String** | |
10
10
**clientNetworks** | **String** | List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped. | [optional]
11
11
**sharedSecret** | **String** | Shared secret between clients and server to hash packets. | [optional]
12
+
**mfaSupport** | **Bool** | When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. | [optional]
12
13
13
14
[[Back to Model list]](../README.md#documentation-for-models)[[Back to API list]](../README.md#documentation-for-api-endpoints)[[Back to README]](../README.md)
Copy file name to clipboardexpand all lines: docs/RadiusProvider.md
+1
Original file line number
Diff line number
Diff line change
@@ -19,6 +19,7 @@ Name | Type | Description | Notes
19
19
**clientNetworks** | **String** | List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped. | [optional]
20
20
**sharedSecret** | **String** | Shared secret between clients and server to hash packets. | [optional]
21
21
**outpostSet** | **[String]** | | [readonly]
22
+
**mfaSupport** | **Bool** | When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. | [optional]
22
23
23
24
[[Back to Model list]](../README.md#documentation-for-models)[[Back to API list]](../README.md#documentation-for-api-endpoints)[[Back to README]](../README.md)
Copy file name to clipboardexpand all lines: docs/RadiusProviderRequest.md
+1
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,7 @@ Name | Type | Description | Notes
9
9
**propertyMappings** | **[UUID]** | | [optional]
10
10
**clientNetworks** | **String** | List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped. | [optional]
11
11
**sharedSecret** | **String** | Shared secret between clients and server to hash packets. | [optional]
12
+
**mfaSupport** | **Bool** | When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. | [optional]
12
13
13
14
[[Back to Model list]](../README.md#documentation-for-models)[[Back to API list]](../README.md#documentation-for-api-endpoints)[[Back to README]](../README.md)
0 commit comments