outposts_proxy_retrieve
GET/outposts/proxy/:id/
ProxyProvider Viewset
Request
Path Parameters
A unique integer value identifying this Proxy Provider.
Responses
- 200
- 400
- 403
- application/json
- Schema
- Example (from schema)
Schema
Validate SSL Certificates of upstream servers
Possible values: <= 255 characters
Possible values: <= 255 characters
oidc_configuration
object
required
rest_framework Serializer for OIDC Configuration
Regular expressions for which authentication is not required. Each new line is interpreted as a new Regular Expression.
Set a custom HTTP-Basic Authentication header based on values from authentik.
User/Group Attribute used for the password part of the HTTP-Basic Header.
User/Group Attribute used for the user part of the HTTP-Basic Header. If not set, the user's Email address is used.
Possible values: [proxy
, forward_single
, forward_domain
]
Get token validity as second count
When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
Get all the scope names the outpost should request, including custom-defined ones
Internal application name, used in URLs.
Application's display Name.
{
"pk": 0,
"name": "string",
"internal_host": "string",
"external_host": "string",
"internal_host_ssl_validation": true,
"client_id": "string",
"client_secret": "string",
"oidc_configuration": {
"issuer": "string",
"authorization_endpoint": "string",
"token_endpoint": "string",
"userinfo_endpoint": "string",
"end_session_endpoint": "string",
"introspection_endpoint": "string",
"jwks_uri": "string",
"response_types_supported": [
"string"
],
"id_token_signing_alg_values_supported": [
"string"
],
"subject_types_supported": [
"string"
],
"token_endpoint_auth_methods_supported": [
"string"
]
},
"cookie_secret": "string",
"certificate": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"skip_path_regex": "string",
"basic_auth_enabled": true,
"basic_auth_password_attribute": "string",
"basic_auth_user_attribute": "string",
"mode": "proxy",
"cookie_domain": "string",
"access_token_validity": 0,
"intercept_header_auth": true,
"scopes_to_request": [
"string"
],
"assigned_application_slug": "string",
"assigned_application_name": "string"
}
- application/json
- Schema
- Example (from schema)
Schema
{
"non_field_errors": [
"string"
],
"code": "string"
}
- application/json
- Schema
- Example (from schema)
Schema
{
"detail": "string",
"code": "string"
}