The authenticator ID.
The linked login info for an identity.
The last used date/time.
The expiration date/time.
The duration an authenticator can be idle before it timed out.
Custom claims to embed into the token.
The type of the settings an authenticator can handle.
The type of the settings an authenticator can handle.
The Type of the generated value an authenticator will be serialized to.
The Type of the generated value an authenticator will be serialized to.
Custom claims to embed into the token.
The expiration date/time.
The expiration date/time.
The authenticator ID.
The authenticator ID.
The duration an authenticator can be idle before it timed out.
The duration an authenticator can be idle before it timed out.
Checks if the authenticator is expired.
Checks if the authenticator is expired. This is an absolute timeout since the creation of the authenticator.
True if the authenticator is expired, false otherwise.
Checks if the time elapsed since the last time the authenticator was used, is longer than the maximum idle timeout specified in the properties.
Checks if the time elapsed since the last time the authenticator was used, is longer than the maximum idle timeout specified in the properties.
True if sliding window expiration is activated and the authenticator is timed out, false otherwise.
Checks if the authenticator isn't expired and isn't timed out.
Checks if the authenticator isn't expired and isn't timed out.
True if the authenticator isn't expired and isn't timed out.
The last used date/time.
The last used date/time.
The linked login info for an identity.
The linked login info for an identity.
An authenticator that uses a header based approach with the help of a JWT. It works by using a JWT to transport the authenticator data inside a user defined header. It can be stateless with the disadvantages that the JWT can't be invalidated.
The authenticator can use sliding window expiration. This means that the authenticator times out after a certain time if it wasn't used. This can be controlled with the idleTimeout property. If this feature is activated then a new token will be generated on every update. Make sure your application can handle this case.
The authenticator ID.
The linked login info for an identity.
The last used date/time.
The expiration date/time.
The duration an authenticator can be idle before it timed out.
Custom claims to embed into the token.
https://developer.atlassian.com/static/connect/docs/concepts/understanding-jwt.html
http://self-issued.info/docs/draft-ietf-oauth-json-web-token.html#Claims