TenantInboundSamlConfig
Inbound SAML configuration for a Identity Toolkit tenant.
You must enable the Google Identity Platform in the marketplace prior to using this resource.
Create a TenantInboundSamlConfig Resource
new TenantInboundSamlConfig(name: string, args: TenantInboundSamlConfigArgs, opts?: CustomResourceOptions);def TenantInboundSamlConfig(resource_name, opts=None, display_name=None, enabled=None, idp_config=None, name=None, project=None, sp_config=None, tenant=None, __props__=None);func NewTenantInboundSamlConfig(ctx *Context, name string, args TenantInboundSamlConfigArgs, opts ...ResourceOption) (*TenantInboundSamlConfig, error)public TenantInboundSamlConfig(string name, TenantInboundSamlConfigArgs args, CustomResourceOptions? opts = null)- name string
- The unique name of the resource.
- args TenantInboundSamlConfigArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- opts ResourceOptions
- A bag of options that control this resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args TenantInboundSamlConfigArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args TenantInboundSamlConfigArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
TenantInboundSamlConfig Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Programming Model docs.
Inputs
The TenantInboundSamlConfig resource accepts the following input properties:
- Display
Name string Human friendly display name.
- Idp
Config TenantInbound Saml Config Idp Config Args SAML IdP configuration when the project acts as the relying party Structure is documented below.
- Sp
Config TenantInbound Saml Config Sp Config Args SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- Tenant string
The name of the tenant where this inbound SAML config resource exists
- Enabled bool
If this config allows users to sign in with the provider.
- Name string
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- Display
Name string Human friendly display name.
- Idp
Config TenantInbound Saml Config Idp Config SAML IdP configuration when the project acts as the relying party Structure is documented below.
- Sp
Config TenantInbound Saml Config Sp Config SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- Tenant string
The name of the tenant where this inbound SAML config resource exists
- Enabled bool
If this config allows users to sign in with the provider.
- Name string
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- display
Name string Human friendly display name.
- idp
Config TenantInbound Saml Config Idp Config SAML IdP configuration when the project acts as the relying party Structure is documented below.
- sp
Config TenantInbound Saml Config Sp Config SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- tenant string
The name of the tenant where this inbound SAML config resource exists
- enabled boolean
If this config allows users to sign in with the provider.
- name string
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project string
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- display_
name str Human friendly display name.
- idp_
config Dict[TenantInbound Saml Config Idp Config] SAML IdP configuration when the project acts as the relying party Structure is documented below.
- sp_
config Dict[TenantInbound Saml Config Sp Config] SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- tenant str
The name of the tenant where this inbound SAML config resource exists
- enabled bool
If this config allows users to sign in with the provider.
- name str
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project str
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
Outputs
All input properties are implicitly available as output properties. Additionally, the TenantInboundSamlConfig resource produces the following output properties:
Look up an Existing TenantInboundSamlConfig Resource
Get an existing TenantInboundSamlConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: TenantInboundSamlConfigState, opts?: CustomResourceOptions): TenantInboundSamlConfigstatic get(resource_name, id, opts=None, display_name=None, enabled=None, idp_config=None, name=None, project=None, sp_config=None, tenant=None, __props__=None);func GetTenantInboundSamlConfig(ctx *Context, name string, id IDInput, state *TenantInboundSamlConfigState, opts ...ResourceOption) (*TenantInboundSamlConfig, error)public static TenantInboundSamlConfig Get(string name, Input<string> id, TenantInboundSamlConfigState? state, CustomResourceOptions? opts = null)- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
The following state arguments are supported:
- Display
Name string Human friendly display name.
- Enabled bool
If this config allows users to sign in with the provider.
- Idp
Config TenantInbound Saml Config Idp Config Args SAML IdP configuration when the project acts as the relying party Structure is documented below.
- Name string
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- Sp
Config TenantInbound Saml Config Sp Config Args SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- Tenant string
The name of the tenant where this inbound SAML config resource exists
- Display
Name string Human friendly display name.
- Enabled bool
If this config allows users to sign in with the provider.
- Idp
Config TenantInbound Saml Config Idp Config SAML IdP configuration when the project acts as the relying party Structure is documented below.
- Name string
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- Sp
Config TenantInbound Saml Config Sp Config SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- Tenant string
The name of the tenant where this inbound SAML config resource exists
- display
Name string Human friendly display name.
- enabled boolean
If this config allows users to sign in with the provider.
- idp
Config TenantInbound Saml Config Idp Config SAML IdP configuration when the project acts as the relying party Structure is documented below.
- name string
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project string
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- sp
Config TenantInbound Saml Config Sp Config SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- tenant string
The name of the tenant where this inbound SAML config resource exists
- display_
name str Human friendly display name.
- enabled bool
If this config allows users to sign in with the provider.
- idp_
config Dict[TenantInbound Saml Config Idp Config] SAML IdP configuration when the project acts as the relying party Structure is documented below.
- name str
The name of the InboundSamlConfig resource. Must start with ‘saml.’ and can only have alphanumeric characters, hyphens, underscores or periods. The part after ‘saml.’ must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project str
The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- sp_
config Dict[TenantInbound Saml Config Sp Config] SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- tenant str
The name of the tenant where this inbound SAML config resource exists
Supporting Types
TenantInboundSamlConfigIdpConfig
- Idp
Certificates List<TenantInbound Saml Config Idp Config Idp Certificate Args> The IDP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- Idp
Entity stringId Unique identifier for all SAML entities
- Sso
Url string URL to send Authentication request to.
- Sign
Request bool Indicates if outbounding SAMLRequest should be signed.
- Idp
Certificates []TenantInbound Saml Config Idp Config Idp Certificate The IDP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- Idp
Entity stringId Unique identifier for all SAML entities
- Sso
Url string URL to send Authentication request to.
- Sign
Request bool Indicates if outbounding SAMLRequest should be signed.
- idp
Certificates TenantInbound Saml Config Idp Config Idp Certificate[] The IDP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- idp
Entity stringId Unique identifier for all SAML entities
- sso
Url string URL to send Authentication request to.
- sign
Request boolean Indicates if outbounding SAMLRequest should be signed.
- idp
Certificates List[TenantInbound Saml Config Idp Config Idp Certificate] The IDP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- idp
Entity strId Unique identifier for all SAML entities
- sso
Url str URL to send Authentication request to.
- sign
Request bool Indicates if outbounding SAMLRequest should be signed.
TenantInboundSamlConfigIdpConfigIdpCertificate
- X509Certificate string
- The x509 certificate
- X509Certificate string
- The x509 certificate
- x509Certificate string
- The x509 certificate
- x509Certificate str
- The x509 certificate
TenantInboundSamlConfigSpConfig
- Callback
Uri string Callback URI where responses from IDP are handled. Must start with
https://.- Sp
Entity stringId Unique identifier for all SAML entities.
- Sp
Certificates List<TenantInbound Saml Config Sp Config Sp Certificate Args> - The IDP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- Callback
Uri string Callback URI where responses from IDP are handled. Must start with
https://.- Sp
Entity stringId Unique identifier for all SAML entities.
- Sp
Certificates []TenantInbound Saml Config Sp Config Sp Certificate - The IDP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- callback
Uri string Callback URI where responses from IDP are handled. Must start with
https://.- sp
Entity stringId Unique identifier for all SAML entities.
- sp
Certificates TenantInbound Saml Config Sp Config Sp Certificate[] - The IDP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- callback
Uri str Callback URI where responses from IDP are handled. Must start with
https://.- sp
Entity strId Unique identifier for all SAML entities.
- sp
Certificates List[TenantInbound Saml Config Sp Config Sp Certificate] - The IDP’s certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
TenantInboundSamlConfigSpConfigSpCertificate
- X509Certificate string
- The x509 certificate
- X509Certificate string
- The x509 certificate
- x509Certificate string
- The x509 certificate
- x509Certificate str
- The x509 certificate
Package Details
- Repository
- https://github.com/pulumi/pulumi-gcp
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
google-betaTerraform Provider.