providers_saml_list
GET/providers/saml/
SAMLProvider Viewset
Request
Query Parameters
Possible values: [http://www.w3.org/2000/09/xmldsig#sha1
, http://www.w3.org/2001/04/xmldsig-more#sha384
, http://www.w3.org/2001/04/xmlenc#sha256
, http://www.w3.org/2001/04/xmlenc#sha512
]
Which field to use when ordering the results.
A page number within the paginated result set.
Number of results to return per page.
A search term.
Possible values: [http://www.w3.org/2000/09/xmldsig#dsa-sha1
, http://www.w3.org/2000/09/xmldsig#rsa-sha1
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha1
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha256
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha384
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha512
, http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
, http://www.w3.org/2001/04/xmldsig-more#rsa-sha384
, http://www.w3.org/2001/04/xmldsig-more#rsa-sha512
]
Possible values: [post
, redirect
]
This determines how authentik sends the response back to the Service Provider.
Responses
- 200
- 400
- 403
- application/json
- Schema
- Example (from schema)
Schema
Array [
]
pagination
object
required
results
object[]
required
Flow used for authentication when the associated application is accessed by an un-authenticated user.
Flow used when authorizing this provider.
Get object component so that we know how to edit the object
Internal application name, used in URLs.
Application's display Name.
Internal application name, used in URLs.
Application's display Name.
Return object's verbose_name
Return object's plural verbose_name
Return internal model name
Possible values: <= 200 characters
Value of the audience restriction field of the assertion. When left empty, no audience restriction will be added.
Also known as EntityID
Assertion valid not before current time + this value (Format: hours=-1;minutes=-2;seconds=-3).
Assertion not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
Session not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
Configure how the NameID value will be created. When left empty, the NameIDPolicy of the incoming request will be considered
Possible values: [http://www.w3.org/2000/09/xmldsig#sha1
, http://www.w3.org/2001/04/xmlenc#sha256
, http://www.w3.org/2001/04/xmldsig-more#sha384
, http://www.w3.org/2001/04/xmlenc#sha512
]
Possible values: [http://www.w3.org/2000/09/xmldsig#rsa-sha1
, http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
, http://www.w3.org/2001/04/xmldsig-more#rsa-sha384
, http://www.w3.org/2001/04/xmldsig-more#rsa-sha512
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha1
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha256
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha384
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha512
, http://www.w3.org/2000/09/xmldsig#dsa-sha1
]
Keypair used to sign outgoing Responses going to the Service Provider.
When selected, incoming assertion's Signatures will be validated against this certificate. To allow unsigned Requests, leave on default.
When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
This determines how authentik sends the response back to the Service Provider.
Possible values: [redirect
, post
]
Default relay_state value for IDP-initiated logins
Get metadata download URL
Get SSO Post URL
Get SSO Redirect URL
Get SSO IDP-Initiated URL
Get SLO POST URL
Get SLO redirect URL
{
"pagination": {
"next": 0,
"previous": 0,
"count": 0,
"current": 0,
"total_pages": 0,
"start_index": 0,
"end_index": 0
},
"results": [
{
"pk": 0,
"name": "string",
"authentication_flow": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"authorization_flow": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"property_mappings": [
"3fa85f64-5717-4562-b3fc-2c963f66afa6"
],
"component": "string",
"assigned_application_slug": "string",
"assigned_application_name": "string",
"assigned_backchannel_application_slug": "string",
"assigned_backchannel_application_name": "string",
"verbose_name": "string",
"verbose_name_plural": "string",
"meta_model_name": "string",
"acs_url": "string",
"audience": "string",
"issuer": "string",
"assertion_valid_not_before": "string",
"assertion_valid_not_on_or_after": "string",
"session_valid_not_on_or_after": "string",
"name_id_mapping": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"digest_algorithm": "http://www.w3.org/2000/09/xmldsig#sha1",
"signature_algorithm": "http://www.w3.org/2000/09/xmldsig#rsa-sha1",
"signing_kp": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"verification_kp": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"encryption_kp": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"sign_assertion": true,
"sign_response": true,
"default_relay_state": "string",
"url_download_metadata": "string",
"url_sso_post": "string",
"url_sso_redirect": "string",
"url_sso_init": "string",
"url_slo_post": "string",
"url_slo_redirect": "string"
}
]
}
- application/json
- Schema
- Example (from schema)
Schema
Validation Error
{
"non_field_errors": [
"string"
],
"code": "string"
}
- application/json
- Schema
- Example (from schema)
Schema
{
"detail": "string",
"code": "string"
}