Package com.okta.sdk.resource.model
Class PolicySubject
java.lang.Object
com.okta.sdk.resource.model.PolicySubject
- All Implemented Interfaces:
Serializable
@Generated(value="org.openapitools.codegen.languages.JavaClientCodegen",
date="2024-09-23T16:19:57.008753975Z[Etc/UTC]",
comments="Generator version: 7.8.0")
public class PolicySubject
extends Object
implements Serializable
Specifies the behavior for establishing, validating, and matching a username for an IdP User
- See Also:
-
Field Summary
-
Constructor Summary
-
Method Summary
Modifier and TypeMethodDescriptionboolean
Optional [regular expression pattern](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Regular_expressions) used to filter untrusted IdP usernames.Okta User profile attribute for matching a transformed IdP username.Get matchTypeGet userNameTemplateint
hashCode()
matchAttribute
(String matchAttribute) matchType
(PolicySubjectMatchType matchType) void
void
setMatchAttribute
(String matchAttribute) void
setMatchType
(PolicySubjectMatchType matchType) void
setUserNameTemplate
(PolicyUserNameTemplate userNameTemplate) toString()
userNameTemplate
(PolicyUserNameTemplate userNameTemplate)
-
Field Details
-
JSON_PROPERTY_FILTER
- See Also:
-
JSON_PROPERTY_MATCH_ATTRIBUTE
- See Also:
-
JSON_PROPERTY_MATCH_TYPE
- See Also:
-
JSON_PROPERTY_USER_NAME_TEMPLATE
- See Also:
-
-
Constructor Details
-
PolicySubject
public PolicySubject()
-
-
Method Details
-
filter
-
getFilter
Optional [regular expression pattern](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Regular_expressions) used to filter untrusted IdP usernames. * As a best security practice, you should define a regular expression pattern to filter untrusted IdP usernames. This is especially important if multiple IdPs are connected to your org. The filter prevents an IdP from issuing an assertion for any User, including partners or directory Users in your Okta org. * For example, the filter pattern `(\\S+@example\\.com)` allows only Users that have an `@example.com` username suffix. It rejects assertions that have any other suffix such as `@corp.example.com` or `@partner.com`. * Only `SAML2` and `OIDC` IdP providers support the `filter` property.- Returns:
- filter
-
setFilter
-
matchAttribute
-
getMatchAttribute
Okta User profile attribute for matching a transformed IdP username. Only for matchType `CUSTOM_ATTRIBUTE`. The `matchAttribute` must be a valid Okta User profile attribute of one of the following types: * String (with no format or 'email' format only) * Integer * Number- Returns:
- matchAttribute
-
setMatchAttribute
-
matchType
-
getMatchType
Get matchType- Returns:
- matchType
-
setMatchType
-
userNameTemplate
-
getUserNameTemplate
Get userNameTemplate- Returns:
- userNameTemplate
-
setUserNameTemplate
-
equals
-
hashCode
public int hashCode() -
toString
-