/
model_apple_mdm_device_security_info.go
300 lines (246 loc) · 22.6 KB
/
model_apple_mdm_device_security_info.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
/*
JumpCloud API
# Overview JumpCloud's V2 API. This set of endpoints allows JumpCloud customers to manage objects, groupings and mappings and interact with the JumpCloud Graph. ## API Best Practices Read the linked Help Article below for guidance on retrying failed requests to JumpCloud's REST API, as well as best practices for structuring subsequent retry requests. Customizing retry mechanisms based on these recommendations will increase the reliability and dependability of your API calls. Covered topics include: 1. Important Considerations 2. Supported HTTP Request Methods 3. Response codes 4. API Key rotation 5. Paginating 6. Error handling 7. Retry rates [JumpCloud Help Center - API Best Practices](https://support.jumpcloud.com/support/s/article/JumpCloud-API-Best-Practices) # Directory Objects This API offers the ability to interact with some of our core features; otherwise known as Directory Objects. The Directory Objects are: * Commands * Policies * Policy Groups * Applications * Systems * Users * User Groups * System Groups * Radius Servers * Directories: Office 365, LDAP,G-Suite, Active Directory * Duo accounts and applications. The Directory Object is an important concept to understand in order to successfully use JumpCloud API. ## JumpCloud Graph We've also introduced the concept of the JumpCloud Graph along with Directory Objects. The Graph is a powerful aspect of our platform which will enable you to associate objects with each other, or establish membership for certain objects to become members of other objects. Specific `GET` endpoints will allow you to traverse the JumpCloud Graph to return all indirect and directly bound objects in your organization. | ![alt text](https://s3.amazonaws.com/jumpcloud-kb/Knowledge+Base+Photos/API+Docs/jumpcloud_graph.png \"JumpCloud Graph Model Example\") | |:--:| | **This diagram highlights our association and membership model as it relates to Directory Objects.** | # API Key ## Access Your API Key To locate your API Key: 1. Log into the [JumpCloud Admin Console](https://console.jumpcloud.com/). 2. Go to the username drop down located in the top-right of the Console. 3. Retrieve your API key from API Settings. ## API Key Considerations This API key is associated to the currently logged in administrator. Other admins will have different API keys. **WARNING** Please keep this API key secret, as it grants full access to any data accessible via your JumpCloud console account. You can also reset your API key in the same location in the JumpCloud Admin Console. ## Recycling or Resetting Your API Key In order to revoke access with the current API key, simply reset your API key. This will render all calls using the previous API key inaccessible. Your API key will be passed in as a header with the header name \"x-api-key\". ```bash curl -H \"x-api-key: [YOUR_API_KEY_HERE]\" \"https://console.jumpcloud.com/api/v2/systemgroups\" ``` # System Context * [Introduction](#introduction) * [Supported endpoints](#supported-endpoints) * [Response codes](#response-codes) * [Authentication](#authentication) * [Additional examples](#additional-examples) * [Third party](#third-party) ## Introduction JumpCloud System Context Authorization is an alternative way to authenticate with a subset of JumpCloud's REST APIs. Using this method, a system can manage its information and resource associations, allowing modern auto provisioning environments to scale as needed. **Notes:** * The following documentation applies to Linux Operating Systems only. * Systems that have been automatically enrolled using Apple's Device Enrollment Program (DEP) or systems enrolled using the User Portal install are not eligible to use the System Context API to prevent unauthorized access to system groups and resources. If a script that utilizes the System Context API is invoked on a system enrolled in this way, it will display an error. ## Supported Endpoints JumpCloud System Context Authorization can be used in conjunction with Systems endpoints found in the V1 API and certain System Group endpoints found in the v2 API. * A system may fetch, alter, and delete metadata about itself, including manipulating a system's Group and Systemuser associations, * `/api/systems/{system_id}` | [`GET`](https://docs.jumpcloud.com/api/1.0/index.html#operation/systems_get) [`PUT`](https://docs.jumpcloud.com/api/1.0/index.html#operation/systems_put) * A system may delete itself from your JumpCloud organization * `/api/systems/{system_id}` | [`DELETE`](https://docs.jumpcloud.com/api/1.0/index.html#operation/systems_delete) * A system may fetch its direct resource associations under v2 (Groups) * `/api/v2/systems/{system_id}/memberof` | [`GET`](https://docs.jumpcloud.com/api/2.0/index.html#operation/graph_systemGroupMembership) * `/api/v2/systems/{system_id}/associations` | [`GET`](https://docs.jumpcloud.com/api/2.0/index.html#operation/graph_systemAssociationsList) * `/api/v2/systems/{system_id}/users` | [`GET`](https://docs.jumpcloud.com/api/2.0/index.html#operation/graph_systemTraverseUser) * A system may alter its direct resource associations under v2 (Groups) * `/api/v2/systems/{system_id}/associations` | [`POST`](https://docs.jumpcloud.com/api/2.0/index.html#operation/graph_systemAssociationsPost) * A system may alter its System Group associations * `/api/v2/systemgroups/{group_id}/members` | [`POST`](https://docs.jumpcloud.com/api/2.0/index.html#operation/graph_systemGroupMembersPost) * _NOTE_ If a system attempts to alter the system group membership of a different system the request will be rejected ## Response Codes If endpoints other than those described above are called using the System Context API, the server will return a `401` response. ## Authentication To allow for secure access to our APIs, you must authenticate each API request. JumpCloud System Context Authorization uses [HTTP Signatures](https://tools.ietf.org/html/draft-cavage-http-signatures-00) to authenticate API requests. The HTTP Signatures sent with each request are similar to the signatures used by the Amazon Web Services REST API. To help with the request-signing process, we have provided an [example bash script](https://github.com/TheJumpCloud/SystemContextAPI/blob/master/examples/shell/SigningExample.sh). This example API request simply requests the entire system record. You must be root, or have permissions to access the contents of the `/opt/jc` directory to generate a signature. Here is a breakdown of the example script with explanations. First, the script extracts the systemKey from the JSON formatted `/opt/jc/jcagent.conf` file. ```bash #!/bin/bash conf=\"`cat /opt/jc/jcagent.conf`\" regex=\"systemKey\\\":\\\"(\\w+)\\\"\" if [[ $conf =~ $regex ]] ; then systemKey=\"${BASH_REMATCH[1]}\" fi ``` Then, the script retrieves the current date in the correct format. ```bash now=`date -u \"+%a, %d %h %Y %H:%M:%S GMT\"`; ``` Next, we build a signing string to demonstrate the expected signature format. The signed string must consist of the [request-line](https://tools.ietf.org/html/rfc2616#page-35) and the date header, separated by a newline character. ```bash signstr=\"GET /api/systems/${systemKey} HTTP/1.1\\ndate: ${now}\" ``` The next step is to calculate and apply the signature. This is a two-step process: 1. Create a signature from the signing string using the JumpCloud Agent private key: ``printf \"$signstr\" | openssl dgst -sha256 -sign /opt/jc/client.key`` 2. Then Base64-encode the signature string and trim off the newline characters: ``| openssl enc -e -a | tr -d '\\n'`` The combined steps above result in: ```bash signature=`printf \"$signstr\" | openssl dgst -sha256 -sign /opt/jc/client.key | openssl enc -e -a | tr -d '\\n'` ; ``` Finally, we make sure the API call sending the signature has the same Authorization and Date header values, HTTP method, and URL that were used in the signing string. ```bash curl -iq \\ -H \"Accept: application/json\" \\ -H \"Content-Type: application/json\" \\ -H \"Date: ${now}\" \\ -H \"Authorization: Signature keyId=\\\"system/${systemKey}\\\",headers=\\\"request-line date\\\",algorithm=\\\"rsa-sha256\\\",signature=\\\"${signature}\\\"\" \\ --url https://console.jumpcloud.com/api/systems/${systemKey} ``` ### Input Data All PUT and POST methods should use the HTTP Content-Type header with a value of 'application/json'. PUT methods are used for updating a record. POST methods are used to create a record. The following example demonstrates how to update the `displayName` of the system. ```bash signstr=\"PUT /api/systems/${systemKey} HTTP/1.1\\ndate: ${now}\" signature=`printf \"$signstr\" | openssl dgst -sha256 -sign /opt/jc/client.key | openssl enc -e -a | tr -d '\\n'` ; curl -iq \\ -d \"{\\\"displayName\\\" : \\\"updated-system-name-1\\\"}\" \\ -X \"PUT\" \\ -H \"Content-Type: application/json\" \\ -H \"Accept: application/json\" \\ -H \"Date: ${now}\" \\ -H \"Authorization: Signature keyId=\\\"system/${systemKey}\\\",headers=\\\"request-line date\\\",algorithm=\\\"rsa-sha256\\\",signature=\\\"${signature}\\\"\" \\ --url https://console.jumpcloud.com/api/systems/${systemKey} ``` ### Output Data All results will be formatted as JSON. Here is an abbreviated example of response output: ```json { \"_id\": \"525ee96f52e144993e000015\", \"agentServer\": \"lappy386\", \"agentVersion\": \"0.9.42\", \"arch\": \"x86_64\", \"connectionKey\": \"127.0.0.1_51812\", \"displayName\": \"ubuntu-1204\", \"firstContact\": \"2013-10-16T19:30:55.611Z\", \"hostname\": \"ubuntu-1204\" ... ``` ## Additional Examples ### Signing Authentication Example This example demonstrates how to make an authenticated request to fetch the JumpCloud record for this system. [SigningExample.sh](https://github.com/TheJumpCloud/SystemContextAPI/blob/master/examples/shell/SigningExample.sh) ### Shutdown Hook This example demonstrates how to make an authenticated request on system shutdown. Using an init.d script registered at run level 0, you can call the System Context API as the system is shutting down. [Instance-shutdown-initd](https://github.com/TheJumpCloud/SystemContextAPI/blob/master/examples/instance-shutdown-initd) is an example of an init.d script that only runs at system shutdown. After customizing the [instance-shutdown-initd](https://github.com/TheJumpCloud/SystemContextAPI/blob/master/examples/instance-shutdown-initd) script, you should install it on the system(s) running the JumpCloud agent. 1. Copy the modified [instance-shutdown-initd](https://github.com/TheJumpCloud/SystemContextAPI/blob/master/examples/instance-shutdown-initd) to `/etc/init.d/instance-shutdown`. 2. On Ubuntu systems, run `update-rc.d instance-shutdown defaults`. On RedHat/CentOS systems, run `chkconfig --add instance-shutdown`. ## Third Party ### Chef Cookbooks [https://github.com/nshenry03/jumpcloud](https://github.com/nshenry03/jumpcloud) [https://github.com/cjs226/jumpcloud](https://github.com/cjs226/jumpcloud) # Multi-Tenant Portal Headers Multi-Tenant Organization API Headers are available for JumpCloud Admins to use when making API requests from Organizations that have multiple managed organizations. The `x-org-id` is a required header for all multi-tenant admins when making API requests to JumpCloud. This header will define to which organization you would like to make the request. **NOTE** Single Tenant Admins do not need to provide this header when making an API request. ## Header Value `x-org-id` ## API Response Codes * `400` Malformed ID. * `400` x-org-id and Organization path ID do not match. * `401` ID not included for multi-tenant admin * `403` ID included on unsupported route. * `404` Organization ID Not Found. ```bash curl -X GET https://console.jumpcloud.com/api/v2/directories \\ -H 'accept: application/json' \\ -H 'content-type: application/json' \\ -H 'x-api-key: {API_KEY}' \\ -H 'x-org-id: {ORG_ID}' ``` ## To Obtain an Individual Organization ID via the UI As a prerequisite, your Primary Organization will need to be setup for Multi-Tenancy. This provides access to the Multi-Tenant Organization Admin Portal. 1. Log into JumpCloud [Admin Console](https://console.jumpcloud.com). If you are a multi-tenant Admin, you will automatically be routed to the Multi-Tenant Admin Portal. 2. From the Multi-Tenant Portal's primary navigation bar, select the Organization you'd like to access. 3. You will automatically be routed to that Organization's Admin Console. 4. Go to Settings in the sub-tenant's primary navigation. 5. You can obtain your Organization ID below your Organization's Contact Information on the Settings page. ## To Obtain All Organization IDs via the API * You can make an API request to this endpoint using the API key of your Primary Organization. `https://console.jumpcloud.com/api/organizations/` This will return all your managed organizations. ```bash curl -X GET \\ https://console.jumpcloud.com/api/organizations/ \\ -H 'Accept: application/json' \\ -H 'Content-Type: application/json' \\ -H 'x-api-key: {API_KEY}' ``` # SDKs You can find language specific SDKs that can help you kickstart your Integration with JumpCloud in the following GitHub repositories: * [Python](https://github.com/TheJumpCloud/jcapi-python) * [Go](https://github.com/TheJumpCloud/jcapi-go) * [Ruby](https://github.com/TheJumpCloud/jcapi-ruby) * [Java](https://github.com/TheJumpCloud/jcapi-java)
API version: 2.0
Contact: support@jumpcloud.com
*/
// Code generated by OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT.
package jcapi2
import (
"encoding/json"
)
// checks if the AppleMdmDeviceSecurityInfo type satisfies the MappedNullable interface at compile time
var _ MappedNullable = &AppleMdmDeviceSecurityInfo{}
// AppleMdmDeviceSecurityInfo Apple MDM device security information
type AppleMdmDeviceSecurityInfo struct {
EnrolledViaDep *bool `json:"enrolledViaDep,omitempty"`
IsActivationLockManageable *bool `json:"isActivationLockManageable,omitempty"`
IsUserEnrollment *bool `json:"isUserEnrollment,omitempty"`
PasscodePresent *bool `json:"passcodePresent,omitempty"`
UserApprovedEnrollment *bool `json:"userApprovedEnrollment,omitempty"`
AdditionalProperties map[string]interface{}
}
type _AppleMdmDeviceSecurityInfo AppleMdmDeviceSecurityInfo
// NewAppleMdmDeviceSecurityInfo instantiates a new AppleMdmDeviceSecurityInfo object
// This constructor will assign default values to properties that have it defined,
// and makes sure properties required by API are set, but the set of arguments
// will change when the set of required properties is changed
func NewAppleMdmDeviceSecurityInfo() *AppleMdmDeviceSecurityInfo {
this := AppleMdmDeviceSecurityInfo{}
return &this
}
// NewAppleMdmDeviceSecurityInfoWithDefaults instantiates a new AppleMdmDeviceSecurityInfo object
// This constructor will only assign default values to properties that have it defined,
// but it doesn't guarantee that properties required by API are set
func NewAppleMdmDeviceSecurityInfoWithDefaults() *AppleMdmDeviceSecurityInfo {
this := AppleMdmDeviceSecurityInfo{}
return &this
}
// GetEnrolledViaDep returns the EnrolledViaDep field value if set, zero value otherwise.
func (o *AppleMdmDeviceSecurityInfo) GetEnrolledViaDep() bool {
if o == nil || IsNil(o.EnrolledViaDep) {
var ret bool
return ret
}
return *o.EnrolledViaDep
}
// GetEnrolledViaDepOk returns a tuple with the EnrolledViaDep field value if set, nil otherwise
// and a boolean to check if the value has been set.
func (o *AppleMdmDeviceSecurityInfo) GetEnrolledViaDepOk() (*bool, bool) {
if o == nil || IsNil(o.EnrolledViaDep) {
return nil, false
}
return o.EnrolledViaDep, true
}
// HasEnrolledViaDep returns a boolean if a field has been set.
func (o *AppleMdmDeviceSecurityInfo) HasEnrolledViaDep() bool {
if o != nil && !IsNil(o.EnrolledViaDep) {
return true
}
return false
}
// SetEnrolledViaDep gets a reference to the given bool and assigns it to the EnrolledViaDep field.
func (o *AppleMdmDeviceSecurityInfo) SetEnrolledViaDep(v bool) {
o.EnrolledViaDep = &v
}
// GetIsActivationLockManageable returns the IsActivationLockManageable field value if set, zero value otherwise.
func (o *AppleMdmDeviceSecurityInfo) GetIsActivationLockManageable() bool {
if o == nil || IsNil(o.IsActivationLockManageable) {
var ret bool
return ret
}
return *o.IsActivationLockManageable
}
// GetIsActivationLockManageableOk returns a tuple with the IsActivationLockManageable field value if set, nil otherwise
// and a boolean to check if the value has been set.
func (o *AppleMdmDeviceSecurityInfo) GetIsActivationLockManageableOk() (*bool, bool) {
if o == nil || IsNil(o.IsActivationLockManageable) {
return nil, false
}
return o.IsActivationLockManageable, true
}
// HasIsActivationLockManageable returns a boolean if a field has been set.
func (o *AppleMdmDeviceSecurityInfo) HasIsActivationLockManageable() bool {
if o != nil && !IsNil(o.IsActivationLockManageable) {
return true
}
return false
}
// SetIsActivationLockManageable gets a reference to the given bool and assigns it to the IsActivationLockManageable field.
func (o *AppleMdmDeviceSecurityInfo) SetIsActivationLockManageable(v bool) {
o.IsActivationLockManageable = &v
}
// GetIsUserEnrollment returns the IsUserEnrollment field value if set, zero value otherwise.
func (o *AppleMdmDeviceSecurityInfo) GetIsUserEnrollment() bool {
if o == nil || IsNil(o.IsUserEnrollment) {
var ret bool
return ret
}
return *o.IsUserEnrollment
}
// GetIsUserEnrollmentOk returns a tuple with the IsUserEnrollment field value if set, nil otherwise
// and a boolean to check if the value has been set.
func (o *AppleMdmDeviceSecurityInfo) GetIsUserEnrollmentOk() (*bool, bool) {
if o == nil || IsNil(o.IsUserEnrollment) {
return nil, false
}
return o.IsUserEnrollment, true
}
// HasIsUserEnrollment returns a boolean if a field has been set.
func (o *AppleMdmDeviceSecurityInfo) HasIsUserEnrollment() bool {
if o != nil && !IsNil(o.IsUserEnrollment) {
return true
}
return false
}
// SetIsUserEnrollment gets a reference to the given bool and assigns it to the IsUserEnrollment field.
func (o *AppleMdmDeviceSecurityInfo) SetIsUserEnrollment(v bool) {
o.IsUserEnrollment = &v
}
// GetPasscodePresent returns the PasscodePresent field value if set, zero value otherwise.
func (o *AppleMdmDeviceSecurityInfo) GetPasscodePresent() bool {
if o == nil || IsNil(o.PasscodePresent) {
var ret bool
return ret
}
return *o.PasscodePresent
}
// GetPasscodePresentOk returns a tuple with the PasscodePresent field value if set, nil otherwise
// and a boolean to check if the value has been set.
func (o *AppleMdmDeviceSecurityInfo) GetPasscodePresentOk() (*bool, bool) {
if o == nil || IsNil(o.PasscodePresent) {
return nil, false
}
return o.PasscodePresent, true
}
// HasPasscodePresent returns a boolean if a field has been set.
func (o *AppleMdmDeviceSecurityInfo) HasPasscodePresent() bool {
if o != nil && !IsNil(o.PasscodePresent) {
return true
}
return false
}
// SetPasscodePresent gets a reference to the given bool and assigns it to the PasscodePresent field.
func (o *AppleMdmDeviceSecurityInfo) SetPasscodePresent(v bool) {
o.PasscodePresent = &v
}
// GetUserApprovedEnrollment returns the UserApprovedEnrollment field value if set, zero value otherwise.
func (o *AppleMdmDeviceSecurityInfo) GetUserApprovedEnrollment() bool {
if o == nil || IsNil(o.UserApprovedEnrollment) {
var ret bool
return ret
}
return *o.UserApprovedEnrollment
}
// GetUserApprovedEnrollmentOk returns a tuple with the UserApprovedEnrollment field value if set, nil otherwise
// and a boolean to check if the value has been set.
func (o *AppleMdmDeviceSecurityInfo) GetUserApprovedEnrollmentOk() (*bool, bool) {
if o == nil || IsNil(o.UserApprovedEnrollment) {
return nil, false
}
return o.UserApprovedEnrollment, true
}
// HasUserApprovedEnrollment returns a boolean if a field has been set.
func (o *AppleMdmDeviceSecurityInfo) HasUserApprovedEnrollment() bool {
if o != nil && !IsNil(o.UserApprovedEnrollment) {
return true
}
return false
}
// SetUserApprovedEnrollment gets a reference to the given bool and assigns it to the UserApprovedEnrollment field.
func (o *AppleMdmDeviceSecurityInfo) SetUserApprovedEnrollment(v bool) {
o.UserApprovedEnrollment = &v
}
func (o AppleMdmDeviceSecurityInfo) MarshalJSON() ([]byte, error) {
toSerialize,err := o.ToMap()
if err != nil {
return []byte{}, err
}
return json.Marshal(toSerialize)
}
func (o AppleMdmDeviceSecurityInfo) ToMap() (map[string]interface{}, error) {
toSerialize := map[string]interface{}{}
if !IsNil(o.EnrolledViaDep) {
toSerialize["enrolledViaDep"] = o.EnrolledViaDep
}
if !IsNil(o.IsActivationLockManageable) {
toSerialize["isActivationLockManageable"] = o.IsActivationLockManageable
}
if !IsNil(o.IsUserEnrollment) {
toSerialize["isUserEnrollment"] = o.IsUserEnrollment
}
if !IsNil(o.PasscodePresent) {
toSerialize["passcodePresent"] = o.PasscodePresent
}
if !IsNil(o.UserApprovedEnrollment) {
toSerialize["userApprovedEnrollment"] = o.UserApprovedEnrollment
}
for key, value := range o.AdditionalProperties {
toSerialize[key] = value
}
return toSerialize, nil
}
func (o *AppleMdmDeviceSecurityInfo) UnmarshalJSON(bytes []byte) (err error) {
varAppleMdmDeviceSecurityInfo := _AppleMdmDeviceSecurityInfo{}
if err = json.Unmarshal(bytes, &varAppleMdmDeviceSecurityInfo); err == nil {
*o = AppleMdmDeviceSecurityInfo(varAppleMdmDeviceSecurityInfo)
}
additionalProperties := make(map[string]interface{})
if err = json.Unmarshal(bytes, &additionalProperties); err == nil {
delete(additionalProperties, "enrolledViaDep")
delete(additionalProperties, "isActivationLockManageable")
delete(additionalProperties, "isUserEnrollment")
delete(additionalProperties, "passcodePresent")
delete(additionalProperties, "userApprovedEnrollment")
o.AdditionalProperties = additionalProperties
}
return err
}
type NullableAppleMdmDeviceSecurityInfo struct {
value *AppleMdmDeviceSecurityInfo
isSet bool
}
func (v NullableAppleMdmDeviceSecurityInfo) Get() *AppleMdmDeviceSecurityInfo {
return v.value
}
func (v *NullableAppleMdmDeviceSecurityInfo) Set(val *AppleMdmDeviceSecurityInfo) {
v.value = val
v.isSet = true
}
func (v NullableAppleMdmDeviceSecurityInfo) IsSet() bool {
return v.isSet
}
func (v *NullableAppleMdmDeviceSecurityInfo) Unset() {
v.value = nil
v.isSet = false
}
func NewNullableAppleMdmDeviceSecurityInfo(val *AppleMdmDeviceSecurityInfo) *NullableAppleMdmDeviceSecurityInfo {
return &NullableAppleMdmDeviceSecurityInfo{value: val, isSet: true}
}
func (v NullableAppleMdmDeviceSecurityInfo) MarshalJSON() ([]byte, error) {
return json.Marshal(v.value)
}
func (v *NullableAppleMdmDeviceSecurityInfo) UnmarshalJSON(src []byte) error {
v.isSet = true
return json.Unmarshal(src, &v.value)
}