Skip to main content

ServiceProviderConfigurationFederationProtocolDetailsInner

Properties

NameTypeDescriptionNotes
roleEnum [ 'SAML_SP' ]Federation protocol role[optional]
entity_idstrAn entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).[optional]
bindingstrDefines the binding used for the SAML flow. Used with IDP configurations.[optional]
auth_contextstrSpecifies the SAML authentication method to use. Used with IDP configurations.[optional]
logout_urlstrThe IDP logout URL. Used with IDP configurations.[optional]
include_auth_contextboolDetermines if the configured AuthnContext should be used or the default. Used with IDP configurations.[optional] [default to False]
name_idstrThe name id format to use. Used with IDP configurations.[optional]
jit_configurationJITConfiguration[optional]
certstrThe Base64-encoded certificate used by the IDP. Used with IDP configurations.[optional]
login_url_poststrThe IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.[optional]
login_url_redirectstrThe IDP Redirect URL. Used with IDP configurations.[optional]
mapping_attributestrReturn the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.[optional]
certificate_expiration_datestrThe expiration date extracted from the certificate.[optional]
certificate_namestrThe name extracted from the certificate.[optional]
aliasstrUnique alias used to identify the selected local service provider based on used URL. Used with SP configurations.[optional]
callback_urlstrThe allowed callback URL where users will be redirected to after authentication. Used with SP configurations.[optional]
}

Example

from sailpoint.v3.models.service_provider_configuration_federation_protocol_details_inner import ServiceProviderConfigurationFederationProtocolDetailsInner

service_provider_configuration_federation_protocol_details_inner = ServiceProviderConfigurationFederationProtocolDetailsInner(
role='SAML_SP',
entity_id='http://www.okta.com/exkdaruy8Ln5Ry7C54x6',
binding='urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST',
auth_context='urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport',
logout_url='https://dev-206445.oktapreview.com/login/signout',
include_auth_context=False,
name_id='urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress',
jit_configuration=sailpoint.v3.models.jit_configuration.JITConfiguration(
enabled = False,
source_id = '2c9180857377ed2901739c12a2da5ac8',
source_attribute_mappings = {firstName=okta.firstName, lastName=okta.lastName, email=okta.email}, ),
cert='-----BEGIN CERTIFICATE-----****-----END CERTIFICATE-----',
login_url_post='https://dev-157216.okta.com/app/sailpointdev157216_cdovsaml_1/exkdaruy8Ln5Ry7C54x6/sso/saml',
login_url_redirect='https://dev-157216.okta.com/app/sailpointdev157216_cdovsaml_1/exkdaruy8Ln5Ry7C54x6/sso/saml',
mapping_attribute='email',
certificate_expiration_date='Fri Mar 08 08:54:24 UTC 2013',
certificate_name='OU=Conext, O=Surfnet, L=Utrecht, ST=Utrecht, C=NL',
alias='acme-sp',
callback_url='https://stradbroke-sso.identitysoon.com/sso/Consumer/metaAlias/cdov-saml/sp'
)

[Back to top]