A valid request URL is required to generate request examples{
"data": {
"id": 123,
"created_at": "2023-11-07T05:31:56Z",
"updated_at": "2023-11-07T05:31:56Z",
"deleted_at": {
"time": "2023-11-07T05:31:56Z",
"valid": true
},
"name": "<string>",
"display_name": "<string>",
"idp_issuer_uri": "<string>",
"idp_sso_uri": "<string>",
"principal_attribute_mappings": [
"<string>"
],
"sp_issuer_uri": "<string>",
"sp_sso_uri": "<string>",
"sp_metadata_uri": "<string>",
"sp_acs_uri": "<string>",
"sso_provider_id": {
"int32": 123,
"valid": true
}
}
}Updates an existing SSO provider. Updating saml provider requires a “multipart/form-data” body. Updating oidc provider requires “application/json” body. Response is respective provider
A valid request URL is required to generate request examples{
"data": {
"id": 123,
"created_at": "2023-11-07T05:31:56Z",
"updated_at": "2023-11-07T05:31:56Z",
"deleted_at": {
"time": "2023-11-07T05:31:56Z",
"valid": true
},
"name": "<string>",
"display_name": "<string>",
"idp_issuer_uri": "<string>",
"idp_sso_uri": "<string>",
"principal_attribute_mappings": [
"<string>"
],
"sp_issuer_uri": "<string>",
"sp_sso_uri": "<string>",
"sp_metadata_uri": "<string>",
"sp_acs_uri": "<string>",
"sso_provider_id": {
"int32": 123,
"valid": true
}
}
}Authorization: Bearer $JWT_TOKEN
Prefer header, used to specify a custom timeout in seconds using the wait parameter as per RFC7240.
x >= 0SSO Provider ID
Name of the new SAML provider.
Metadata XML file.
boolean that, if enabled, allows SSO providers to auto provision bloodhound users on initial login
"true"
default role id for the user created from SSO provider auto provision
"3"
boolean that, if enabled, allows sso providers to manage roles for newly created users
"false"
OK
Show child attributes