-
Notifications
You must be signed in to change notification settings - Fork 18
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Automated commit 'PLTIN-5722: Update bypassIdp Description In Service…
…ProviderConfiguration (#1462) * PLTIN-5722: Update bypassIdp Description In ServiceProviderConfiguration * PLTIN-5722: Fix linting errors * PLTIN-5722: Add default boolean values and description to ServiceProviderConfiguration' by github action: 6593121142
- Loading branch information
1 parent
1f9ccf3
commit bff3c4e
Showing
2 changed files
with
62 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,15 +1,67 @@ | ||
description: >- | ||
Represents the IdentityNow as Service Provider Configuration | ||
allowing customers to log into IDN via an Identity Provider | ||
type: object | ||
properties: | ||
enabled: | ||
description: This determines whether or not the SAML authentication flow is enabled for an org | ||
type: boolean | ||
example: true | ||
default: false | ||
bypassIdp: | ||
description: This allows basic login with the parameter prompt=true. This is often toggled on when debugging SAML authentication setup. | ||
description: >- | ||
This allows basic login with the parameter prompt=true. | ||
This is often toggled on when debugging SAML authentication setup. | ||
When false, only org admins with MFA-enabled can bypass the IDP. | ||
type: boolean | ||
example: true | ||
default: false | ||
samlConfigurationValid: | ||
description: This indicates whether or not the SAML configuration is valid. | ||
type: boolean | ||
example: true | ||
default: false | ||
federationProtocolDetails: | ||
description: >- | ||
A list of the abstract implementations of the Federation Protocol details. | ||
Typically, this will include on SpDetails object and one IdpDetails object | ||
used in tandem to define a SAML integration between a customer's identity | ||
provider and a customer's SailPoint instance (i.e., the service provider). | ||
type: array | ||
items: | ||
oneOf: | ||
- $ref: 'IdpDetails.yaml' | ||
- $ref: 'SpDetails.yaml' | ||
example: [ | ||
{ | ||
"role": "SAML_IDP", | ||
"entityId": "http://www.okta.com/exktq4o24bmQA4fr60h7", | ||
"cert": "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", | ||
"loginUrlPost": "https://dev-206445.oktapreview.com/app/tivolidev206445_acmeidntest_1/exktq4o24bmQA4fr60h7/sso/saml", | ||
"loginUrlRedirect": "https://dev-206445.oktapreview.com/app/tivolidev206445_acmeidntest_1/exktq4o24bmQA4fr60h7/sso/saml", | ||
"logoutUrl": "https://dev-206445.oktapreview.com/login/signout", | ||
"nameId": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress", | ||
"binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", | ||
"authnContext": "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", | ||
"includeAuthnContext": true, | ||
"mappingAttribute": "email", | ||
"jitConfiguration": { | ||
"enabled": true, | ||
"sourceId": "2c9180897427f3a501745042afc83144", | ||
"sourceAttributeMappings": { | ||
"firstName": "okta.firstName", | ||
"lastName": "okta.lastName", | ||
"email": "okta.email" | ||
} | ||
}, | ||
"certificateExpirationDate": "Thu May 26 21:31:59 GMT 2033", | ||
"certificateName": "[email protected], CN=dev-206445, OU=SSOProvider, O=Okta, L=San Francisco, ST=California, C=US" | ||
}, | ||
{ | ||
"role": "SAML_SP", | ||
"entityId": "https://acme.identitysoon.com/sp", | ||
"alias": "acme-sp", | ||
"callbackUrl": "https://acme.test-login.sailpoint.com/saml/SSO/alias/acme-sp", | ||
"legacyAcsUrl": "https://megapod-useast1-sso.identitysoon.com/sso/Consumer/metaAlias/acme/sp" | ||
} | ||
] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters