sources_kerberos_list
GET/sources/kerberos/
Kerberos Source Viewset
Request
Query Parameters
Which field to use when ordering the results.
A page number within the paginated result set.
Number of results to return per page.
A search term.
Responses
- 200
- 400
- 403
- application/json
- Schema
- Example (from schema)
Schema
Array [
]
pagination
object
required
results
object[]
required
Source's display Name.
Internal source name, used in URLs.
Possible values: <= 50 characters
, Value must match regular expression ^[-a-zA-Z0-9_]+$
Flow to use when authenticating existing users.
Flow to use when enrolling new users.
Get object component so that we know how to edit the object
Return object's verbose_name
Return object's plural verbose_name
Return internal model name
Possible values: [all
, any
]
How the source determines if an existing user should be authenticated or a new user enrolled.
Possible values: [identifier
, email_link
, email_deny
, username_link
, username_deny
]
Objects that are managed by authentik. These objects are created and updated automatically. This flag only indicates that an object can be overwritten by migrations. You can still modify the objects via the API, but expect changes to be overwritten in a later update.
How the source determines if an existing group should be used or a new group created.
Possible values: [identifier
, name_link
, name_deny
]
Kerberos realm
Custom krb5.conf to use. Uses the system one by default
Sync users from Kerberos into authentik
When a user changes their password, sync it back to Kerberos
Principal to authenticate to kadmin for sync.
Credentials cache to authenticate to kadmin for sync. Must be in the form TYPE:residual
connectivity
object
nullable
required
Get cached source connectivity
Force the use of a specific server name for SPNEGO. Must be in the form HTTP@hostname
Credential cache to use for SPNEGO in form type:residual
If enabled, the authentik-stored password will be updated upon login with the Kerberos password backend
{
"pagination": {
"next": 0,
"previous": 0,
"count": 0,
"current": 0,
"total_pages": 0,
"start_index": 0,
"end_index": 0
},
"results": [
{
"pk": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"name": "string",
"slug": "string",
"enabled": true,
"authentication_flow": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"enrollment_flow": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"user_property_mappings": [
"3fa85f64-5717-4562-b3fc-2c963f66afa6"
],
"group_property_mappings": [
"3fa85f64-5717-4562-b3fc-2c963f66afa6"
],
"component": "string",
"verbose_name": "string",
"verbose_name_plural": "string",
"meta_model_name": "string",
"policy_engine_mode": "all",
"managed": "string",
"user_path_template": "string",
"icon": "string",
"realm": "string",
"krb5_conf": "string",
"sync_users": true,
"sync_users_password": true,
"sync_principal": "string",
"sync_ccache": "string",
"connectivity": {},
"spnego_server_name": "string",
"spnego_ccache": "string",
"password_login_update_internal_password": true
}
]
}
- application/json
- Schema
- Example (from schema)
Schema
Validation Error
{
"non_field_errors": [
"string"
],
"code": "string"
}
- application/json
- Schema
- Example (from schema)
Schema
{
"detail": "string",
"code": "string"
}