From bff3c4ea99bd8c1792f7a33dcd074cccbc9fce4a Mon Sep 17 00:00:00 2001 From: GitHub Action Bot Date: Fri, 20 Oct 2023 22:05:08 +0000 Subject: [PATCH] Automated commit 'PLTIN-5722: Update bypassIdp Description In ServiceProviderConfiguration (#1462) * PLTIN-5722: Update bypassIdp Description In ServiceProviderConfiguration * PLTIN-5722: Fix linting errors * PLTIN-5722: Add default boolean values and description to ServiceProviderConfiguration' by github action: 6593121142 --- .../schemas/ServiceProviderConfiguration.yaml | 54 ++++++++++++++++++- idn/v3/paths/access-request-status.yaml | 9 ++++ 2 files changed, 62 insertions(+), 1 deletion(-) diff --git a/idn/beta/schemas/ServiceProviderConfiguration.yaml b/idn/beta/schemas/ServiceProviderConfiguration.yaml index 7567d77..cd21072 100644 --- a/idn/beta/schemas/ServiceProviderConfiguration.yaml +++ b/idn/beta/schemas/ServiceProviderConfiguration.yaml @@ -1,15 +1,67 @@ +description: >- + Represents the IdentityNow as Service Provider Configuration + allowing customers to log into IDN via an Identity Provider type: object properties: enabled: + description: This determines whether or not the SAML authentication flow is enabled for an org type: boolean + example: true + default: false bypassIdp: - description: This allows basic login with the parameter prompt=true. This is often toggled on when debugging SAML authentication setup. + description: >- + This allows basic login with the parameter prompt=true. + This is often toggled on when debugging SAML authentication setup. + When false, only org admins with MFA-enabled can bypass the IDP. type: boolean + example: true + default: false samlConfigurationValid: + description: This indicates whether or not the SAML configuration is valid. type: boolean + example: true + default: false federationProtocolDetails: + description: >- + A list of the abstract implementations of the Federation Protocol details. + Typically, this will include on SpDetails object and one IdpDetails object + used in tandem to define a SAML integration between a customer's identity + provider and a customer's SailPoint instance (i.e., the service provider). type: array items: oneOf: - $ref: 'IdpDetails.yaml' - $ref: 'SpDetails.yaml' + example: [ + { + "role": "SAML_IDP", + "entityId": "http://www.okta.com/exktq4o24bmQA4fr60h7", + "cert": "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", + "loginUrlPost": "https://dev-206445.oktapreview.com/app/tivolidev206445_acmeidntest_1/exktq4o24bmQA4fr60h7/sso/saml", + "loginUrlRedirect": "https://dev-206445.oktapreview.com/app/tivolidev206445_acmeidntest_1/exktq4o24bmQA4fr60h7/sso/saml", + "logoutUrl": "https://dev-206445.oktapreview.com/login/signout", + "nameId": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress", + "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + "authnContext": "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", + "includeAuthnContext": true, + "mappingAttribute": "email", + "jitConfiguration": { + "enabled": true, + "sourceId": "2c9180897427f3a501745042afc83144", + "sourceAttributeMappings": { + "firstName": "okta.firstName", + "lastName": "okta.lastName", + "email": "okta.email" + } + }, + "certificateExpirationDate": "Thu May 26 21:31:59 GMT 2033", + "certificateName": "EMAILADDRESS=info@okta.com, CN=dev-206445, OU=SSOProvider, O=Okta, L=San Francisco, ST=California, C=US" + }, + { + "role": "SAML_SP", + "entityId": "https://acme.identitysoon.com/sp", + "alias": "acme-sp", + "callbackUrl": "https://acme.test-login.sailpoint.com/saml/SSO/alias/acme-sp", + "legacyAcsUrl": "https://megapod-useast1-sso.identitysoon.com/sso/Consumer/metaAlias/acme/sp" + } + ] diff --git a/idn/v3/paths/access-request-status.yaml b/idn/v3/paths/access-request-status.yaml index db4dff8..a604d36 100644 --- a/idn/v3/paths/access-request-status.yaml +++ b/idn/v3/paths/access-request-status.yaml @@ -43,6 +43,15 @@ get: requester or target of the requests. *me* indicates the current user. Mutually exclusive with *requested-for* and *requested-by*. required: false + - in: query + name: assigned-to + schema: + type: string + example: 2c9180877b2b6ea4017b2c545f971429 + description: >- + Filter the results by the specified identity which is the + owner of the Identity Request Work Item. *me* indicates the current user. + required: false - in: query name: count description: >-