-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmodel_public_profile_response_certificate.go
223 lines (184 loc) · 13 KB
/
model_public_profile_response_certificate.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
/*
Enterprise PKI Manager REST API
Welcome to the DigiCert ONE Enterprise PKI Manager REST API. The Enterprise PKI Manager API service provides operations for managing enrollments and certificates for users and devices, retrieving certificate profiles and seats, and account event reporting. ## Base URL The base URL path for endpoints in the Enterprise PKI Manager REST API is: `{server}/mpki/api/v1`. Replace `{server}` with the hostname of your DigiCert ONE instance. For example, if you are using the DigiCert ONE hosted cloud solution, your `{server}` is `https://one.digicert.com`. ## Authentication API clients can authenticate to endpoints in the Enterprise PKI Manager REST API using these methods: * Header-based API token authentication. * Authentication using a client authentication certificate. ### API token To authenticate with an API token, include the custom HTTP header `x-api-key` in your request. Use one of these values in the `x-api-key` header: * A Service user token ID (**recommended**). * An API token bound to a DigiCert ONE administrator. **Note:** We recommend that you dedicate a Service user token ID to API operations as this distinguishes API requests from administrator actions in your account audit logs. **Service user token ID** * Service users are API tokens that are not associated with a specific user. * When you create a service user, you assign only the permissions needed for the API integration. * There are two ways to create a new service user: * 1- Use the Account Manager in DigiCert ONE: 1. Navigate to the DigiCert ONE **Account Manager**. 2. Select **Access** from the left menu. 3. Select **Service User** from the left menu. 4. Select **Create service user** and follow the remaining prompts. * 2- Make a request to the `/account/api/v1/user` endpoint in the DigiCert ONE Account Manager API service. **Administrator API token** * Standard users (administrators) can create API tokens in DigiCert ONE. * API tokens have the same permissions and access scope as the administrator that created them. * Actions linked to the API token are logged under the administrator's name in event audit logs. * To generate a new API token: 1. Navigate to the DigiCert ONE **Account Manager**. 2. Select **Access** from the left menu. 3. Select **Administrators**. 4. Select the administrator you wish to create an API token for from the list. 5. Scroll down to the **API Tokens** section on the administrator page. 6. Select **Create API token** and follow the remaining prompts. ### Client authentication certificate When authenticating with a client authentication certificate, you present a trusted certificate in your request. Both DigiCert ONE administrators and service users can use client authentication certificates. To generate a client authentication certificate: 1. Navigate to the DigiCert ONE **Account Manager**. 2. Select **Access** from the left menu. 3. Search for and select your Service user. 4. Scroll to the **Authentication certificates** section and select **Create authentication certificate**. 5. Enter a **Nickname** and select an **End date** for the certificate. 6. Select **Generate certificate**. Copy the password that is displayed (this is only displayed once and is required to decrypt the PKCS12 certificate file) and select **Download certificate**. 7. Confirm that you have downloaded the certificate file (**Certificate_pkcs12.p12**) and that you can successfully decrypt it with the provided password, then click **Close** in the certificate download dialog box. 8. Review the permissions you wish to provide to the Service user that the certificate is associated with. **Note**: We recommend that you assign permissions according to the principle of least privilege, i.e. you assign the minimum permissions needed to perform the required tasks. To use a client authentication certificate: * Include the certificate in your API request. * In the base URL for the endpoint path, add the prefix `clientauth`. For example: `https://clientauth.one.digicert.com` * Omit the `x-api-key` header. ## Requests The Enterprise PKI Manager API service accepts REST calls on HTTP/HTTPS ports 80/443. All requests are submitted using RESTful URLs and REST features, including header-based authentication and JSON request types. The data character set encoding for requests is UTF-8. A well-formed request uses port 443 and specifies the user-agent and content-length HTTP headers. Each request consists of a method and an endpoint. Some requests also include a request payload if relevant to the operation being performed. ### Method The Enterprise PKI Manager API uses these standard HTTP methods: * GET * POST * PUT * DELETE ### Body and content type All requests that accept a body require passing in JSON formatted data with the `Content-Type` header set to `application/json`. GET requests do not require passing formatted data in the request payload. However, some GET operations allow you to filter the results by providing additional path parameters or URL query strings (appended to the endpoint URL, e.g. `?limit=50`). ## Responses Each response consists of a header and a body. The body is formatted based on the content type requested in the `Accept` header. **Note:** Enterprise PKI Manager API endpoints only support responses with a content type of `application/json`. Requests that use the `Accept` header to specify a different content type will fail. ### Headers Each response includes a header with a response code based on [RFC 2616](https://www.w3.org/Protocols/rfc2616/rfc2616-sec6.html#sec6.1.1) specifications. * HTTP codes in the **200-399** range describe a successful request. Response bodies for HTTP codes in this range include the response data associated with the operation. * HTTP codes in the **400+** range describe an error. Unsuccessful requests return a list with one or more `errors`. Each error object includes a `code` and a `message` describing the problem with the request. **Example error response** ```JSON { \"error\": { \"code\": \"no_access\", \"message\": \"User has no access to the Business unit with id = xxxxx or such Business unit does not exist\" } } ```
API version: 1.0.0
*/
// Code generated by OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT.
package openapi
import (
"encoding/json"
)
// PublicProfileResponseCertificate struct for PublicProfileResponseCertificate
type PublicProfileResponseCertificate struct {
Subject *PublicProfileResponseCertificateSubject `json:"subject,omitempty"`
Validity *Validity `json:"validity,omitempty"`
Extensions *PublicProfileResponseCertificateExtensions `json:"extensions,omitempty"`
Issuer *PublicProfileResponseCertificateIssuer `json:"issuer,omitempty"`
}
// NewPublicProfileResponseCertificate instantiates a new PublicProfileResponseCertificate object
// This constructor will assign default values to properties that have it defined,
// and makes sure properties required by API are set, but the set of arguments
// will change when the set of required properties is changed
func NewPublicProfileResponseCertificate() *PublicProfileResponseCertificate {
this := PublicProfileResponseCertificate{}
return &this
}
// NewPublicProfileResponseCertificateWithDefaults instantiates a new PublicProfileResponseCertificate object
// This constructor will only assign default values to properties that have it defined,
// but it doesn't guarantee that properties required by API are set
func NewPublicProfileResponseCertificateWithDefaults() *PublicProfileResponseCertificate {
this := PublicProfileResponseCertificate{}
return &this
}
// GetSubject returns the Subject field value if set, zero value otherwise.
func (o *PublicProfileResponseCertificate) GetSubject() PublicProfileResponseCertificateSubject {
if o == nil || o.Subject == nil {
var ret PublicProfileResponseCertificateSubject
return ret
}
return *o.Subject
}
// GetSubjectOk returns a tuple with the Subject field value if set, nil otherwise
// and a boolean to check if the value has been set.
func (o *PublicProfileResponseCertificate) GetSubjectOk() (*PublicProfileResponseCertificateSubject, bool) {
if o == nil || o.Subject == nil {
return nil, false
}
return o.Subject, true
}
// HasSubject returns a boolean if a field has been set.
func (o *PublicProfileResponseCertificate) HasSubject() bool {
if o != nil && o.Subject != nil {
return true
}
return false
}
// SetSubject gets a reference to the given PublicProfileResponseCertificateSubject and assigns it to the Subject field.
func (o *PublicProfileResponseCertificate) SetSubject(v PublicProfileResponseCertificateSubject) {
o.Subject = &v
}
// GetValidity returns the Validity field value if set, zero value otherwise.
func (o *PublicProfileResponseCertificate) GetValidity() Validity {
if o == nil || o.Validity == nil {
var ret Validity
return ret
}
return *o.Validity
}
// GetValidityOk returns a tuple with the Validity field value if set, nil otherwise
// and a boolean to check if the value has been set.
func (o *PublicProfileResponseCertificate) GetValidityOk() (*Validity, bool) {
if o == nil || o.Validity == nil {
return nil, false
}
return o.Validity, true
}
// HasValidity returns a boolean if a field has been set.
func (o *PublicProfileResponseCertificate) HasValidity() bool {
if o != nil && o.Validity != nil {
return true
}
return false
}
// SetValidity gets a reference to the given Validity and assigns it to the Validity field.
func (o *PublicProfileResponseCertificate) SetValidity(v Validity) {
o.Validity = &v
}
// GetExtensions returns the Extensions field value if set, zero value otherwise.
func (o *PublicProfileResponseCertificate) GetExtensions() PublicProfileResponseCertificateExtensions {
if o == nil || o.Extensions == nil {
var ret PublicProfileResponseCertificateExtensions
return ret
}
return *o.Extensions
}
// GetExtensionsOk returns a tuple with the Extensions field value if set, nil otherwise
// and a boolean to check if the value has been set.
func (o *PublicProfileResponseCertificate) GetExtensionsOk() (*PublicProfileResponseCertificateExtensions, bool) {
if o == nil || o.Extensions == nil {
return nil, false
}
return o.Extensions, true
}
// HasExtensions returns a boolean if a field has been set.
func (o *PublicProfileResponseCertificate) HasExtensions() bool {
if o != nil && o.Extensions != nil {
return true
}
return false
}
// SetExtensions gets a reference to the given PublicProfileResponseCertificateExtensions and assigns it to the Extensions field.
func (o *PublicProfileResponseCertificate) SetExtensions(v PublicProfileResponseCertificateExtensions) {
o.Extensions = &v
}
// GetIssuer returns the Issuer field value if set, zero value otherwise.
func (o *PublicProfileResponseCertificate) GetIssuer() PublicProfileResponseCertificateIssuer {
if o == nil || o.Issuer == nil {
var ret PublicProfileResponseCertificateIssuer
return ret
}
return *o.Issuer
}
// GetIssuerOk returns a tuple with the Issuer field value if set, nil otherwise
// and a boolean to check if the value has been set.
func (o *PublicProfileResponseCertificate) GetIssuerOk() (*PublicProfileResponseCertificateIssuer, bool) {
if o == nil || o.Issuer == nil {
return nil, false
}
return o.Issuer, true
}
// HasIssuer returns a boolean if a field has been set.
func (o *PublicProfileResponseCertificate) HasIssuer() bool {
if o != nil && o.Issuer != nil {
return true
}
return false
}
// SetIssuer gets a reference to the given PublicProfileResponseCertificateIssuer and assigns it to the Issuer field.
func (o *PublicProfileResponseCertificate) SetIssuer(v PublicProfileResponseCertificateIssuer) {
o.Issuer = &v
}
func (o PublicProfileResponseCertificate) MarshalJSON() ([]byte, error) {
toSerialize := map[string]interface{}{}
if o.Subject != nil {
toSerialize["subject"] = o.Subject
}
if o.Validity != nil {
toSerialize["validity"] = o.Validity
}
if o.Extensions != nil {
toSerialize["extensions"] = o.Extensions
}
if o.Issuer != nil {
toSerialize["issuer"] = o.Issuer
}
return json.Marshal(toSerialize)
}
type NullablePublicProfileResponseCertificate struct {
value *PublicProfileResponseCertificate
isSet bool
}
func (v NullablePublicProfileResponseCertificate) Get() *PublicProfileResponseCertificate {
return v.value
}
func (v *NullablePublicProfileResponseCertificate) Set(val *PublicProfileResponseCertificate) {
v.value = val
v.isSet = true
}
func (v NullablePublicProfileResponseCertificate) IsSet() bool {
return v.isSet
}
func (v *NullablePublicProfileResponseCertificate) Unset() {
v.value = nil
v.isSet = false
}
func NewNullablePublicProfileResponseCertificate(val *PublicProfileResponseCertificate) *NullablePublicProfileResponseCertificate {
return &NullablePublicProfileResponseCertificate{value: val, isSet: true}
}
func (v NullablePublicProfileResponseCertificate) MarshalJSON() ([]byte, error) {
return json.Marshal(v.value)
}
func (v *NullablePublicProfileResponseCertificate) UnmarshalJSON(src []byte) error {
v.isSet = true
return json.Unmarshal(src, &v.value)
}