providers_saml_retrieve
GET/providers/saml/:id/
SAMLProvider Viewset
Request
Path Parameters
A unique integer value identifying this SAML Provider.
Responses
- 200
- 400
- 403
- application/json
- Schema
- Example (from schema)
Schema
Flow used for authentication when the associated application is accessed by an un-authenticated user.
Flow used when authorizing this provider.
Get object component so that we know how to edit the object
Internal application name, used in URLs.
Application's display Name.
Internal application name, used in URLs.
Application's display Name.
Return object's verbose_name
Return object's plural verbose_name
Return internal model name
Possible values: <= 200 characters
Value of the audience restriction field of the assertion. When left empty, no audience restriction will be added.
Also known as EntityID
Assertion valid not before current time + this value (Format: hours=-1;minutes=-2;seconds=-3).
Assertion not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
Session not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).
Configure how the NameID value will be created. When left empty, the NameIDPolicy of the incoming request will be considered
Possible values: [http://www.w3.org/2000/09/xmldsig#sha1
, http://www.w3.org/2001/04/xmlenc#sha256
, http://www.w3.org/2001/04/xmldsig-more#sha384
, http://www.w3.org/2001/04/xmlenc#sha512
]
Possible values: [http://www.w3.org/2000/09/xmldsig#rsa-sha1
, http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
, http://www.w3.org/2001/04/xmldsig-more#rsa-sha384
, http://www.w3.org/2001/04/xmldsig-more#rsa-sha512
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha1
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha256
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha384
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha512
, http://www.w3.org/2000/09/xmldsig#dsa-sha1
]
Keypair used to sign outgoing Responses going to the Service Provider.
When selected, incoming assertion's Signatures will be validated against this certificate. To allow unsigned Requests, leave on default.
When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
This determines how authentik sends the response back to the Service Provider.
Possible values: [redirect
, post
]
Default relay_state value for IDP-initiated logins
Get metadata download URL
Get SSO Post URL
Get SSO Redirect URL
Get SSO IDP-Initiated URL
Get SLO POST URL
Get SLO redirect URL
{
"pk": 0,
"name": "string",
"authentication_flow": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"authorization_flow": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"property_mappings": [
"3fa85f64-5717-4562-b3fc-2c963f66afa6"
],
"component": "string",
"assigned_application_slug": "string",
"assigned_application_name": "string",
"assigned_backchannel_application_slug": "string",
"assigned_backchannel_application_name": "string",
"verbose_name": "string",
"verbose_name_plural": "string",
"meta_model_name": "string",
"acs_url": "string",
"audience": "string",
"issuer": "string",
"assertion_valid_not_before": "string",
"assertion_valid_not_on_or_after": "string",
"session_valid_not_on_or_after": "string",
"name_id_mapping": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"digest_algorithm": "http://www.w3.org/2000/09/xmldsig#sha1",
"signature_algorithm": "http://www.w3.org/2000/09/xmldsig#rsa-sha1",
"signing_kp": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"verification_kp": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"encryption_kp": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"sign_assertion": true,
"sign_response": true,
"default_relay_state": "string",
"url_download_metadata": "string",
"url_sso_post": "string",
"url_sso_redirect": "string",
"url_sso_init": "string",
"url_slo_post": "string",
"url_slo_redirect": "string"
}
- application/json
- Schema
- Example (from schema)
Schema
Validation Error
{
"non_field_errors": [
"string"
],
"code": "string"
}
- application/json
- Schema
- Example (from schema)
Schema
{
"detail": "string",
"code": "string"
}