stages_password_list
GET/stages/password/
PasswordStage Viewset
Request
Query Parameters
Which field to use when ordering the results.
A page number within the paginated result set.
Number of results to return per page.
A search term.
Responses
- 200
- 400
- 403
- application/json
- Schema
- Example (from schema)
Schema
Array [
Array [
]
]
pagination
object
required
results
object[]
required
Get object type so that we know how to edit the object
Return object's verbose_name
Return object's plural verbose_name
Return internal model name
flow_set
object[]
Visible in the URL.
Possible values: <= 50 characters
, Value must match regular expression ^[-a-zA-Z0-9_]+$
Shown as the Title in Flow pages.
Decides what this Flow is used for. For example, the Authentication flow is redirect to when an un-authenticated user visits authentik.
Possible values: [authentication
, authorization
, invalidation
, enrollment
, unenrollment
, recovery
, stage_configuration
]
Get the URL to the background image. If the name is /static or starts with http it is returned as-is
Possible values: [all
, any
]
Enable compatibility mode, increases compatibility with password managers on mobile devices.
Get export URL for flow
Possible values: [stacked
, content_left
, content_right
, sidebar_left
, sidebar_right
]
Configure what should happen when a flow denies access to a user.
Possible values: [message_continue
, message
, continue
]
Selection of backends to test the password against.
Possible values: [authentik.core.auth.InbuiltBackend
, authentik.core.auth.TokenBackend
, authentik.sources.ldap.auth.LDAPBackend
, authentik.sources.kerberos.auth.KerberosBackend
]
Flow used by an authenticated user to configure this Stage. If empty, user will not be able to configure this stage.
How many attempts a user has before the flow is canceled. To lock the user out, use a reputation policy and a user_write stage.
Possible values: >= -2147483648
and <= 2147483647
When enabled, provides a 'show password' button with the password input field.
{
"pagination": {
"next": 0,
"previous": 0,
"count": 0,
"current": 0,
"total_pages": 0,
"start_index": 0,
"end_index": 0
},
"results": [
{
"pk": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"name": "string",
"component": "string",
"verbose_name": "string",
"verbose_name_plural": "string",
"meta_model_name": "string",
"flow_set": [
{
"pk": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"policybindingmodel_ptr_id": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"name": "string",
"slug": "string",
"title": "string",
"background": "string",
"policy_engine_mode": "all",
"compatibility_mode": true,
"export_url": "string",
"layout": "stacked"
}
],
"backends": [
"authentik.core.auth.InbuiltBackend"
],
"configure_flow": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"failed_attempts_before_cancel": 0,
"allow_show_password": true
}
]
}
- application/json
- Schema
- Example (from schema)
Schema
Validation Error
{
"non_field_errors": [
"string"
],
"code": "string"
}
- application/json
- Schema
- Example (from schema)
Schema
{
"detail": "string",
"code": "string"
}