InboundSamlConfig
Inbound SAML configuration for a Identity Toolkit project.
You must enable the Google Identity Platform in the marketplace prior to using this resource.
Create a InboundSamlConfig Resource
new InboundSamlConfig(name: string, args: InboundSamlConfigArgs, opts?: CustomResourceOptions);def InboundSamlConfig(resource_name, opts=None, display_name=None, enabled=None, idp_config=None, name=None, project=None, sp_config=None, __props__=None);func NewInboundSamlConfig(ctx *Context, name string, args InboundSamlConfigArgs, opts ...ResourceOption) (*InboundSamlConfig, error)public InboundSamlConfig(string name, InboundSamlConfigArgs args, CustomResourceOptions? opts = null)- name string
- The unique name of the resource.
- args InboundSamlConfigArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- opts ResourceOptions
- A bag of options that control this resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args InboundSamlConfigArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args InboundSamlConfigArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
InboundSamlConfig Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Programming Model docs.
Inputs
The InboundSamlConfig resource accepts the following input properties:
- Display
Name string Human friendly display name.
- Idp
Config InboundSaml Config Idp Config Args SAML IdP configuration when the project acts as the relying party Structure is documented below.
- Sp
Config InboundSaml Config Sp Config Args SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- Enabled bool
If this config allows users to sign in with the provider.
- Name string
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- Display
Name string Human friendly display name.
- Idp
Config InboundSaml Config Idp Config SAML IdP configuration when the project acts as the relying party Structure is documented below.
- Sp
Config InboundSaml Config Sp Config SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- Enabled bool
If this config allows users to sign in with the provider.
- Name string
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- display
Name string Human friendly display name.
- idp
Config InboundSaml Config Idp Config SAML IdP configuration when the project acts as the relying party Structure is documented below.
- sp
Config InboundSaml Config Sp Config SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- enabled boolean
If this config allows users to sign in with the provider.
- name string
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project string
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- display_
name str Human friendly display name.
- idp_
config Dict[InboundSaml Config Idp Config] SAML IdP configuration when the project acts as the relying party Structure is documented below.
- sp_
config Dict[InboundSaml Config Sp Config] SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- enabled bool
If this config allows users to sign in with the provider.
- name str
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project str
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
Outputs
All input properties are implicitly available as output properties. Additionally, the InboundSamlConfig resource produces the following output properties:
Look up an Existing InboundSamlConfig Resource
Get an existing InboundSamlConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: InboundSamlConfigState, opts?: CustomResourceOptions): InboundSamlConfigstatic get(resource_name, id, opts=None, display_name=None, enabled=None, idp_config=None, name=None, project=None, sp_config=None, __props__=None);func GetInboundSamlConfig(ctx *Context, name string, id IDInput, state *InboundSamlConfigState, opts ...ResourceOption) (*InboundSamlConfig, error)public static InboundSamlConfig Get(string name, Input<string> id, InboundSamlConfigState? state, CustomResourceOptions? opts = null)- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
The following state arguments are supported:
- Display
Name string Human friendly display name.
- Enabled bool
If this config allows users to sign in with the provider.
- Idp
Config InboundSaml Config Idp Config Args SAML IdP configuration when the project acts as the relying party Structure is documented below.
- Name string
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- Sp
Config InboundSaml Config Sp Config Args SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- Display
Name string Human friendly display name.
- Enabled bool
If this config allows users to sign in with the provider.
- Idp
Config InboundSaml Config Idp Config SAML IdP configuration when the project acts as the relying party Structure is documented below.
- Name string
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- Sp
Config InboundSaml Config Sp Config SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- display
Name string Human friendly display name.
- enabled boolean
If this config allows users to sign in with the provider.
- idp
Config InboundSaml Config Idp Config SAML IdP configuration when the project acts as the relying party Structure is documented below.
- name string
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project string
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- sp
Config InboundSaml Config Sp Config SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- display_
name str Human friendly display name.
- enabled bool
If this config allows users to sign in with the provider.
- idp_
config Dict[InboundSaml Config Idp Config] SAML IdP configuration when the project acts as the relying party Structure is documented below.
- name str
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project str
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- sp_
config Dict[InboundSaml Config Sp Config] SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
Supporting Types
InboundSamlConfigIdpConfig
- Idp
Certificates List<InboundSaml Config Idp Config Idp Certificate Args> The IdP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- Idp
Entity stringId Unique identifier for all SAML entities
- Sso
Url string URL to send Authentication request to.
- Sign
Request bool Indicates if outbounding SAMLRequest should be signed.
- Idp
Certificates []InboundSaml Config Idp Config Idp Certificate The IdP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- Idp
Entity stringId Unique identifier for all SAML entities
- Sso
Url string URL to send Authentication request to.
- Sign
Request bool Indicates if outbounding SAMLRequest should be signed.
- idp
Certificates InboundSaml Config Idp Config Idp Certificate[] The IdP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- idp
Entity stringId Unique identifier for all SAML entities
- sso
Url string URL to send Authentication request to.
- sign
Request boolean Indicates if outbounding SAMLRequest should be signed.
- idp
Certificates List[InboundSaml Config Idp Config Idp Certificate] The IdP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- idp
Entity strId Unique identifier for all SAML entities
- sso
Url str URL to send Authentication request to.
- sign
Request bool Indicates if outbounding SAMLRequest should be signed.
InboundSamlConfigIdpConfigIdpCertificate
- X509Certificate string
- The x509 certificate
- X509Certificate string
- The x509 certificate
- x509Certificate string
- The x509 certificate
- x509Certificate str
- The x509 certificate
InboundSamlConfigSpConfig
- Callback
Uri string Callback URI where responses from IDP are handled. Must start with
https://.- Sp
Certificates List<InboundSaml Config Sp Config Sp Certificate Args> - The IDP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- Sp
Entity stringId Unique identifier for all SAML entities.
- Callback
Uri string Callback URI where responses from IDP are handled. Must start with
https://.- Sp
Certificates []InboundSaml Config Sp Config Sp Certificate - The IDP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- Sp
Entity stringId Unique identifier for all SAML entities.
- callback
Uri string Callback URI where responses from IDP are handled. Must start with
https://.- sp
Certificates InboundSaml Config Sp Config Sp Certificate[] - The IDP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- sp
Entity stringId Unique identifier for all SAML entities.
- callback
Uri str Callback URI where responses from IDP are handled. Must start with
https://.- sp
Certificates List[InboundSaml Config Sp Config Sp Certificate] - The IDP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- sp
Entity strId Unique identifier for all SAML entities.
InboundSamlConfigSpConfigSpCertificate
- X509Certificate string
- The x509 certificate
- X509Certificate string
- The x509 certificate
- x509Certificate string
- The x509 certificate
- x509Certificate str
- The x509 certificate
Package Details
- Repository
- https://github.com/pulumi/pulumi-gcp
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
google-betaTerraform Provider.