Skip to content

Latest commit

 

History

History
28 lines (24 loc) · 2.69 KB

AuthMethodCreateSAML.md

File metadata and controls

28 lines (24 loc) · 2.69 KB

akeyless.Model.AuthMethodCreateSAML

authMethodCreateSAML is a command that creates a new auth method that will be available to authenticate using SAML.

Properties

Name Type Description Notes
AccessExpires long Access expiration date in Unix timestamp (select 0 for access without expiry date) [optional] [default to 0]
AllowedRedirectUri List<string> Allowed redirect URIs after the authentication [optional]
AuditLogsClaims List<string> Subclaims to include in audit logs, e.g &quot;- -audit-logs-claims email - -audit-logs-claims username&quot; [optional]
BoundIps List<string> A CIDR whitelist with the IPs that the access is restricted to [optional]
DeleteProtection string Protection from accidental deletion of this object [true/false] [optional]
Description string Auth Method description [optional]
ForceSubClaims bool if true: enforce role-association must include sub claims [optional]
GwBoundIps List<string> A CIDR whitelist with the GW IPs that the access is restricted to [optional]
IdpMetadataUrl string IDP metadata url [optional]
IdpMetadataXmlData string IDP metadata xml data [optional]
Json bool Set output format to JSON [optional] [default to false]
JwtTtl long Jwt TTL [optional] [default to 0]
Name string Auth Method name
ProductType List<string> Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] [optional]
SubclaimsDelimiters List<string> A list of additional sub claims delimiters (relevant only for SAML, OIDC, OAuth2/JWT) [optional]
Token string Authentication token (see `/auth` and `/configure`) [optional]
UidToken string The universal identity token, Required only for universal_identity authentication [optional]
UniqueIdentifier string A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a &quot;sub claim&quot; that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.

[Back to Model list] [Back to API list] [Back to README]