mirror of
https://github.com/LukeHagar/api-specs.git
synced 2025-12-09 04:19:16 +00:00
* PLTIN-5722: Update bypassIdp Description In ServiceProviderConfiguration * PLTIN-5722: Fix linting errors * PLTIN-5722: Add default boolean values and description to ServiceProviderConfiguration' by github action: 6593121142
68 lines
4.0 KiB
YAML
68 lines
4.0 KiB
YAML
description: >-
|
|
Represents the IdentityNow as Service Provider Configuration
|
|
allowing customers to log into IDN via an Identity Provider
|
|
type: object
|
|
properties:
|
|
enabled:
|
|
description: This determines whether or not the SAML authentication flow is enabled for an org
|
|
type: boolean
|
|
example: true
|
|
default: false
|
|
bypassIdp:
|
|
description: >-
|
|
This allows basic login with the parameter prompt=true.
|
|
This is often toggled on when debugging SAML authentication setup.
|
|
When false, only org admins with MFA-enabled can bypass the IDP.
|
|
type: boolean
|
|
example: true
|
|
default: false
|
|
samlConfigurationValid:
|
|
description: This indicates whether or not the SAML configuration is valid.
|
|
type: boolean
|
|
example: true
|
|
default: false
|
|
federationProtocolDetails:
|
|
description: >-
|
|
A list of the abstract implementations of the Federation Protocol details.
|
|
Typically, this will include on SpDetails object and one IdpDetails object
|
|
used in tandem to define a SAML integration between a customer's identity
|
|
provider and a customer's SailPoint instance (i.e., the service provider).
|
|
type: array
|
|
items:
|
|
oneOf:
|
|
- $ref: 'IdpDetails.yaml'
|
|
- $ref: 'SpDetails.yaml'
|
|
example: [
|
|
{
|
|
"role": "SAML_IDP",
|
|
"entityId": "http://www.okta.com/exktq4o24bmQA4fr60h7",
|
|
"cert": "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",
|
|
"loginUrlPost": "https://dev-206445.oktapreview.com/app/tivolidev206445_acmeidntest_1/exktq4o24bmQA4fr60h7/sso/saml",
|
|
"loginUrlRedirect": "https://dev-206445.oktapreview.com/app/tivolidev206445_acmeidntest_1/exktq4o24bmQA4fr60h7/sso/saml",
|
|
"logoutUrl": "https://dev-206445.oktapreview.com/login/signout",
|
|
"nameId": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
|
|
"binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
|
|
"authnContext": "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
|
|
"includeAuthnContext": true,
|
|
"mappingAttribute": "email",
|
|
"jitConfiguration": {
|
|
"enabled": true,
|
|
"sourceId": "2c9180897427f3a501745042afc83144",
|
|
"sourceAttributeMappings": {
|
|
"firstName": "okta.firstName",
|
|
"lastName": "okta.lastName",
|
|
"email": "okta.email"
|
|
}
|
|
},
|
|
"certificateExpirationDate": "Thu May 26 21:31:59 GMT 2033",
|
|
"certificateName": "EMAILADDRESS=info@okta.com, CN=dev-206445, OU=SSOProvider, O=Okta, L=San Francisco, ST=California, C=US"
|
|
},
|
|
{
|
|
"role": "SAML_SP",
|
|
"entityId": "https://acme.identitysoon.com/sp",
|
|
"alias": "acme-sp",
|
|
"callbackUrl": "https://acme.test-login.sailpoint.com/saml/SSO/alias/acme-sp",
|
|
"legacyAcsUrl": "https://megapod-useast1-sso.identitysoon.com/sso/Consumer/metaAlias/acme/sp"
|
|
}
|
|
]
|