Skip to content

Commit bef284d

Browse files
committed
- Added MFA_AS_SERVICE as Application SignOn mode for the list_applications() operation.
1 parent 96ef4dc commit bef284d

4 files changed

Lines changed: 13 additions & 3 deletions

File tree

docs/ApplicationSignOnMode.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# ApplicationSignOnMode
22

3-
Authentication mode for the app | signOnMode | Description | | ---------- | ----------- | | AUTO_LOGIN | Secure Web Authentication (SWA) | | BASIC_AUTH | HTTP Basic Authentication with Okta Browser Plugin | | BOOKMARK | Just a bookmark (no-authentication) | | BROWSER_PLUGIN | Secure Web Authentication (SWA) with Okta Browser Plugin | | OPENID_CONNECT | Federated Authentication with OpenID Connect (OIDC) | | SAML_1_1 | Federated Authentication with SAML 1.1 WebSSO (not supported for custom apps) | | SAML_2_0 | Federated Authentication with SAML 2.0 WebSSO | | SECURE_PASSWORD_STORE | Secure Web Authentication (SWA) with POST (plugin not required) | | WS_FEDERATION | Federated Authentication with WS-Federation Passive Requestor Profile | Select the `signOnMode` for your custom app:
3+
Authentication mode for the app | signOnMode | Description | | ---------- | ----------- | | AUTO_LOGIN | Secure Web Authentication (SWA) | | BASIC_AUTH | HTTP Basic Authentication with Okta Browser Plugin | | BOOKMARK | Just a bookmark (no-authentication) | | BROWSER_PLUGIN | Secure Web Authentication (SWA) with Okta Browser Plugin | | OPENID_CONNECT | Federated Authentication with OpenID Connect (OIDC) | | SAML_1_1 | Federated Authentication with SAML 1.1 WebSSO (not supported for custom apps) | | SAML_2_0 | Federated Authentication with SAML 2.0 WebSSO | | SECURE_PASSWORD_STORE | Secure Web Authentication (SWA) with POST (plugin not required) | | WS_FEDERATION | Federated Authentication with WS-Federation Passive Requestor Profile | | MFA_AS_SERVICE | | Select the `signOnMode` for your custom app:
44

55
## Properties
66

okta/models/application.py

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,7 @@
5050
from okta.models.basic_auth_application import BasicAuthApplication
5151
from okta.models.bookmark_application import BookmarkApplication
5252
from okta.models.browser_plugin_application import BrowserPluginApplication
53+
from okta.models.application import Application
5354
from okta.models.open_id_connect_application import OpenIdConnectApplication
5455
from okta.models.saml11_application import Saml11Application
5556
from okta.models.saml_application import SamlApplication
@@ -59,7 +60,7 @@
5960
from okta.models.ws_federation_application import WsFederationApplication
6061

6162

62-
class Application(BaseModel):
63+
class Application(BaseModel): # noqa: F811
6364
"""
6465
Application
6566
""" # noqa: E501
@@ -209,6 +210,7 @@ def features_validate_enum(cls, value):
209210
"BASIC_AUTH": "BasicAuthApplication",
210211
"BOOKMARK": "BookmarkApplication",
211212
"BROWSER_PLUGIN": "BrowserPluginApplication",
213+
"MFA_AS_SERVICE": "Application",
212214
"OPENID_CONNECT": "OpenIdConnectApplication",
213215
"SAML_1_1": "Saml11Application",
214216
"SAML_2_0": "SamlApplication",
@@ -241,6 +243,7 @@ def from_json(cls, json_str: str) -> Optional[
241243
BasicAuthApplication,
242244
BookmarkApplication,
243245
BrowserPluginApplication,
246+
Application,
244247
OpenIdConnectApplication,
245248
Saml11Application,
246249
SamlApplication,
@@ -339,6 +342,7 @@ def from_dict(cls, obj: Dict[str, Any]) -> Optional[
339342
BasicAuthApplication,
340343
BookmarkApplication,
341344
BrowserPluginApplication,
345+
Application,
342346
OpenIdConnectApplication,
343347
Saml11Application,
344348
SamlApplication,
@@ -365,6 +369,8 @@ def from_dict(cls, obj: Dict[str, Any]) -> Optional[
365369
return import_module(
366370
"okta.models.browser_plugin_application"
367371
).BrowserPluginApplication.from_dict(obj)
372+
if object_type == "Application":
373+
return import_module("okta.models.application").Application.from_dict(obj)
368374
if object_type == "OpenIdConnectApplication":
369375
return import_module(
370376
"okta.models.open_id_connect_application"

okta/models/application_sign_on_mode.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ class ApplicationSignOnMode(str, Enum):
3636
Federated Authentication with OpenID Connect (OIDC) | | SAML_1_1 | Federated Authentication with SAML 1.1 WebSSO (not
3737
supported for custom apps) | | SAML_2_0 | Federated Authentication with SAML 2.0 WebSSO | | SECURE_PASSWORD_STORE |
3838
Secure Web Authentication (SWA) with POST (plugin not required) | | WS_FEDERATION | Federated Authentication with
39-
WS-Federation Passive Requestor Profile | Select the `signOnMode` for your custom app:
39+
WS-Federation Passive Requestor Profile | | MFA_AS_SERVICE | | Select the `signOnMode` for your custom app:
4040
"""
4141

4242
"""
@@ -51,6 +51,7 @@ class ApplicationSignOnMode(str, Enum):
5151
SAML_2_0 = "SAML_2_0"
5252
SECURE_PASSWORD_STORE = "SECURE_PASSWORD_STORE"
5353
WS_FEDERATION = "WS_FEDERATION"
54+
MFA_AS_SERVICE = "MFA_AS_SERVICE"
5455

5556
@classmethod
5657
def from_json(cls, json_str: str) -> Self:

openapi/api.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59271,6 +59271,7 @@ components:
5927159271
SAML_2_0: '#/components/schemas/SamlApplication'
5927259272
SECURE_PASSWORD_STORE: '#/components/schemas/SecurePasswordStoreApplication'
5927359273
WS_FEDERATION: '#/components/schemas/WsFederationApplication'
59274+
MFA_AS_SERVICE: '#/components/schemas/Application'
5927459275
ApplicationAccessibility:
5927559276
description: Specifies access settings for the app
5927659277
type: object
@@ -59733,6 +59734,7 @@ components:
5973359734
| SAML_2_0 | Federated Authentication with SAML 2.0 WebSSO |
5973459735
| SECURE_PASSWORD_STORE | Secure Web Authentication (SWA) with POST (plugin not required) |
5973559736
| WS_FEDERATION | Federated Authentication with WS-Federation Passive Requestor Profile |
59737+
| MFA_AS_SERVICE | |
5973659738

5973759739
Select the `signOnMode` for your custom app:
5973859740
type: string
@@ -59746,6 +59748,7 @@ components:
5974659748
- SAML_2_0
5974759749
- SECURE_PASSWORD_STORE
5974859750
- WS_FEDERATION
59751+
- MFA_AS_SERVICE
5974959752
ApplicationType:
5975059753
description: 'The type of client application. Default value: `web`.'
5975159754
type: string

0 commit comments

Comments
 (0)