Oidc
Creates an OIDC Identity Provider.
This resource allows you to create and configure an OIDC Identity Provider.
Example Usage
using Pulumi;
using Okta = Pulumi.Okta;
class MyStack : Stack
{
public MyStack()
{
var example = new Okta.Idp.Oidc("example", new Okta.Idp.OidcArgs
{
AcsBinding = "HTTP-POST",
AcsType = "INSTANCE",
AuthorizationBinding = "HTTP-REDIRECT",
AuthorizationUrl = "https://idp.example.com/authorize",
ClientId = "efg456",
ClientSecret = "efg456",
IssuerUrl = "https://id.example.com",
JwksBinding = "HTTP-REDIRECT",
JwksUrl = "https://idp.example.com/keys",
Scopes =
{
"openid",
},
TokenBinding = "HTTP-POST",
TokenUrl = "https://idp.example.com/token",
UserInfoBinding = "HTTP-REDIRECT",
UserInfoUrl = "https://idp.example.com/userinfo",
UsernameTemplate = "idpuser.email",
});
}
}
Coming soon!
import pulumi
import pulumi_okta as okta
example = okta.idp.Oidc("example",
acs_binding="HTTP-POST",
acs_type="INSTANCE",
authorization_binding="HTTP-REDIRECT",
authorization_url="https://idp.example.com/authorize",
client_id="efg456",
client_secret="efg456",
issuer_url="https://id.example.com",
jwks_binding="HTTP-REDIRECT",
jwks_url="https://idp.example.com/keys",
scopes=["openid"],
token_binding="HTTP-POST",
token_url="https://idp.example.com/token",
user_info_binding="HTTP-REDIRECT",
user_info_url="https://idp.example.com/userinfo",
username_template="idpuser.email")import * as pulumi from "@pulumi/pulumi";
import * as okta from "@pulumi/okta";
const example = new okta.idp.Oidc("example", {
acsBinding: "HTTP-POST",
acsType: "INSTANCE",
authorizationBinding: "HTTP-REDIRECT",
authorizationUrl: "https://idp.example.com/authorize",
clientId: "efg456",
clientSecret: "efg456",
issuerUrl: "https://id.example.com",
jwksBinding: "HTTP-REDIRECT",
jwksUrl: "https://idp.example.com/keys",
scopes: ["openid"],
tokenBinding: "HTTP-POST",
tokenUrl: "https://idp.example.com/token",
userInfoBinding: "HTTP-REDIRECT",
userInfoUrl: "https://idp.example.com/userinfo",
usernameTemplate: "idpuser.email",
});Create a Oidc Resource
new Oidc(name: string, args: OidcArgs, opts?: CustomResourceOptions);def Oidc(resource_name, opts=None, account_link_action=None, account_link_group_includes=None, acs_binding=None, acs_type=None, authorization_binding=None, authorization_url=None, client_id=None, client_secret=None, deprovisioned_action=None, groups_action=None, groups_assignments=None, groups_attribute=None, groups_filters=None, issuer_mode=None, issuer_url=None, jwks_binding=None, jwks_url=None, max_clock_skew=None, name=None, profile_master=None, protocol_type=None, provisioning_action=None, request_signature_algorithm=None, request_signature_scope=None, response_signature_algorithm=None, response_signature_scope=None, scopes=None, status=None, subject_match_attribute=None, subject_match_type=None, suspended_action=None, token_binding=None, token_url=None, user_info_binding=None, user_info_url=None, username_template=None, __props__=None);public Oidc(string name, OidcArgs args, CustomResourceOptions? opts = null)- name string
- The unique name of the resource.
- args OidcArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- opts ResourceOptions
- A bag of options that control this resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args OidcArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args OidcArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
Oidc Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Programming Model docs.
Inputs
The Oidc resource accepts the following input properties:
- Acs
Binding string The method of making an ACS request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- string
The method of making an authorization request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- string
IdP Authorization Server (AS) endpoint to request consent from the user and obtain an authorization code grant.
- Client
Id string Unique identifier issued by AS for the Okta IdP instance.
- Client
Secret string Client secret issued by AS for the Okta IdP instance.
- Issuer
Url string URI that identifies the issuer.
- Jwks
Binding string The method of making a request for the OIDC JWKS. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- Jwks
Url string Endpoint where the signer of the keys publishes its keys in a JWK Set.
- Scopes List<string>
The scopes of the IdP.
- Token
Binding string The method of making a token request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- Token
Url string IdP Authorization Server (AS) endpoint to exchange the authorization code grant for an access token.
- Account
Link stringAction Specifies the account linking action for an IdP user.
- Account
Link List<string>Group Includes Group memberships to determine link candidates.
- Acs
Type string The type of ACS. Default is
"INSTANCE".- Deprovisioned
Action string Action for a previously deprovisioned IdP user during authentication. Can be
"NONE"or"REACTIVATE".- Groups
Action string Provisioning action for IdP user’s group memberships. It can be
"NONE","SYNC","APPEND", or"ASSIGN".- Groups
Assignments List<string> List of Okta Group IDs to add an IdP user as a member with the
"ASSIGN"groups_action.- Groups
Attribute string IdP user profile attribute name (case-insensitive) for an array value that contains group memberships.
- Groups
Filters List<string> Whitelist of Okta Group identifiers that are allowed for the
"APPEND"or"SYNC"groups_action.- Issuer
Mode string Indicates whether Okta uses the original Okta org domain URL, or a custom domain URL. It can be
"ORG_URL"or"CUSTOM_URL".- Max
Clock intSkew Maximum allowable clock-skew when processing messages from the IdP.
- Name string
The Application’s display name.
- Profile
Master bool Determines if the IdP should act as a source of truth for user profile attributes.
- Protocol
Type string The type of protocol to use. It can be
"OIDC"or"OAUTH2".- Provisioning
Action string Provisioning action for an IdP user during authentication.
- Request
Signature stringAlgorithm algorithm to use to sign requests
- Request
Signature stringScope algorithm to use to sign response
- Response
Signature stringAlgorithm algorithm to use to sign requests
- Response
Signature stringScope algorithm to use to sign response
- Status string
Status of the IdP.
- Subject
Match stringAttribute Okta user profile attribute for matching transformed IdP username. Only for matchType
"CUSTOM_ATTRIBUTE".- Subject
Match stringType Determines the Okta user profile attribute match conditions for account linking and authentication of the transformed IdP username. By default it is set to
"USERNAME". It can be set to"USERNAME","EMAIL","USERNAME_OR_EMAIL"or"CUSTOM_ATTRIBUTE".- Suspended
Action string Action for a previously suspended IdP user during authentication. Can be set to
"NONE"or"UNSUSPEND"- User
Info stringBinding - User
Info stringUrl Protected resource endpoint that returns claims about the authenticated user.
- Username
Template string Okta EL Expression to generate or transform a unique username for the IdP user.
- Acs
Binding string The method of making an ACS request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- string
The method of making an authorization request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- string
IdP Authorization Server (AS) endpoint to request consent from the user and obtain an authorization code grant.
- Client
Id string Unique identifier issued by AS for the Okta IdP instance.
- Client
Secret string Client secret issued by AS for the Okta IdP instance.
- Issuer
Url string URI that identifies the issuer.
- Jwks
Binding string The method of making a request for the OIDC JWKS. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- Jwks
Url string Endpoint where the signer of the keys publishes its keys in a JWK Set.
- Scopes []string
The scopes of the IdP.
- Token
Binding string The method of making a token request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- Token
Url string IdP Authorization Server (AS) endpoint to exchange the authorization code grant for an access token.
- Account
Link stringAction Specifies the account linking action for an IdP user.
- Account
Link []stringGroup Includes Group memberships to determine link candidates.
- Acs
Type string The type of ACS. Default is
"INSTANCE".- Deprovisioned
Action string Action for a previously deprovisioned IdP user during authentication. Can be
"NONE"or"REACTIVATE".- Groups
Action string Provisioning action for IdP user’s group memberships. It can be
"NONE","SYNC","APPEND", or"ASSIGN".- Groups
Assignments []string List of Okta Group IDs to add an IdP user as a member with the
"ASSIGN"groups_action.- Groups
Attribute string IdP user profile attribute name (case-insensitive) for an array value that contains group memberships.
- Groups
Filters []string Whitelist of Okta Group identifiers that are allowed for the
"APPEND"or"SYNC"groups_action.- Issuer
Mode string Indicates whether Okta uses the original Okta org domain URL, or a custom domain URL. It can be
"ORG_URL"or"CUSTOM_URL".- Max
Clock intSkew Maximum allowable clock-skew when processing messages from the IdP.
- Name string
The Application’s display name.
- Profile
Master bool Determines if the IdP should act as a source of truth for user profile attributes.
- Protocol
Type string The type of protocol to use. It can be
"OIDC"or"OAUTH2".- Provisioning
Action string Provisioning action for an IdP user during authentication.
- Request
Signature stringAlgorithm algorithm to use to sign requests
- Request
Signature stringScope algorithm to use to sign response
- Response
Signature stringAlgorithm algorithm to use to sign requests
- Response
Signature stringScope algorithm to use to sign response
- Status string
Status of the IdP.
- Subject
Match stringAttribute Okta user profile attribute for matching transformed IdP username. Only for matchType
"CUSTOM_ATTRIBUTE".- Subject
Match stringType Determines the Okta user profile attribute match conditions for account linking and authentication of the transformed IdP username. By default it is set to
"USERNAME". It can be set to"USERNAME","EMAIL","USERNAME_OR_EMAIL"or"CUSTOM_ATTRIBUTE".- Suspended
Action string Action for a previously suspended IdP user during authentication. Can be set to
"NONE"or"UNSUSPEND"- User
Info stringBinding - User
Info stringUrl Protected resource endpoint that returns claims about the authenticated user.
- Username
Template string Okta EL Expression to generate or transform a unique username for the IdP user.
- acs
Binding string The method of making an ACS request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- string
The method of making an authorization request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- string
IdP Authorization Server (AS) endpoint to request consent from the user and obtain an authorization code grant.
- client
Id string Unique identifier issued by AS for the Okta IdP instance.
- client
Secret string Client secret issued by AS for the Okta IdP instance.
- issuer
Url string URI that identifies the issuer.
- jwks
Binding string The method of making a request for the OIDC JWKS. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- jwks
Url string Endpoint where the signer of the keys publishes its keys in a JWK Set.
- scopes string[]
The scopes of the IdP.
- token
Binding string The method of making a token request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- token
Url string IdP Authorization Server (AS) endpoint to exchange the authorization code grant for an access token.
- account
Link stringAction Specifies the account linking action for an IdP user.
- account
Link string[]Group Includes Group memberships to determine link candidates.
- acs
Type string The type of ACS. Default is
"INSTANCE".- deprovisioned
Action string Action for a previously deprovisioned IdP user during authentication. Can be
"NONE"or"REACTIVATE".- groups
Action string Provisioning action for IdP user’s group memberships. It can be
"NONE","SYNC","APPEND", or"ASSIGN".- groups
Assignments string[] List of Okta Group IDs to add an IdP user as a member with the
"ASSIGN"groups_action.- groups
Attribute string IdP user profile attribute name (case-insensitive) for an array value that contains group memberships.
- groups
Filters string[] Whitelist of Okta Group identifiers that are allowed for the
"APPEND"or"SYNC"groups_action.- issuer
Mode string Indicates whether Okta uses the original Okta org domain URL, or a custom domain URL. It can be
"ORG_URL"or"CUSTOM_URL".- max
Clock numberSkew Maximum allowable clock-skew when processing messages from the IdP.
- name string
The Application’s display name.
- profile
Master boolean Determines if the IdP should act as a source of truth for user profile attributes.
- protocol
Type string The type of protocol to use. It can be
"OIDC"or"OAUTH2".- provisioning
Action string Provisioning action for an IdP user during authentication.
- request
Signature stringAlgorithm algorithm to use to sign requests
- request
Signature stringScope algorithm to use to sign response
- response
Signature stringAlgorithm algorithm to use to sign requests
- response
Signature stringScope algorithm to use to sign response
- status string
Status of the IdP.
- subject
Match stringAttribute Okta user profile attribute for matching transformed IdP username. Only for matchType
"CUSTOM_ATTRIBUTE".- subject
Match stringType Determines the Okta user profile attribute match conditions for account linking and authentication of the transformed IdP username. By default it is set to
"USERNAME". It can be set to"USERNAME","EMAIL","USERNAME_OR_EMAIL"or"CUSTOM_ATTRIBUTE".- suspended
Action string Action for a previously suspended IdP user during authentication. Can be set to
"NONE"or"UNSUSPEND"- user
Info stringBinding - user
Info stringUrl Protected resource endpoint that returns claims about the authenticated user.
- username
Template string Okta EL Expression to generate or transform a unique username for the IdP user.
- acs_
binding str The method of making an ACS request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- str
The method of making an authorization request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- str
IdP Authorization Server (AS) endpoint to request consent from the user and obtain an authorization code grant.
- client_
id str Unique identifier issued by AS for the Okta IdP instance.
- client_
secret str Client secret issued by AS for the Okta IdP instance.
- issuer_
url str URI that identifies the issuer.
- jwks_
binding str The method of making a request for the OIDC JWKS. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- jwks_
url str Endpoint where the signer of the keys publishes its keys in a JWK Set.
- scopes List[str]
The scopes of the IdP.
- token_
binding str The method of making a token request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- token_
url str IdP Authorization Server (AS) endpoint to exchange the authorization code grant for an access token.
- account_
link_ straction Specifies the account linking action for an IdP user.
- account_
link_ List[str]group_ includes Group memberships to determine link candidates.
- acs_
type str The type of ACS. Default is
"INSTANCE".- deprovisioned_
action str Action for a previously deprovisioned IdP user during authentication. Can be
"NONE"or"REACTIVATE".- groups_
action str Provisioning action for IdP user’s group memberships. It can be
"NONE","SYNC","APPEND", or"ASSIGN".- groups_
assignments List[str] List of Okta Group IDs to add an IdP user as a member with the
"ASSIGN"groups_action.- groups_
attribute str IdP user profile attribute name (case-insensitive) for an array value that contains group memberships.
- groups_
filters List[str] Whitelist of Okta Group identifiers that are allowed for the
"APPEND"or"SYNC"groups_action.- issuer_
mode str Indicates whether Okta uses the original Okta org domain URL, or a custom domain URL. It can be
"ORG_URL"or"CUSTOM_URL".- max_
clock_ floatskew Maximum allowable clock-skew when processing messages from the IdP.
- name str
The Application’s display name.
- profile_
master bool Determines if the IdP should act as a source of truth for user profile attributes.
- protocol_
type str The type of protocol to use. It can be
"OIDC"or"OAUTH2".- provisioning_
action str Provisioning action for an IdP user during authentication.
- request_
signature_ stralgorithm algorithm to use to sign requests
- request_
signature_ strscope algorithm to use to sign response
- response_
signature_ stralgorithm algorithm to use to sign requests
- response_
signature_ strscope algorithm to use to sign response
- status str
Status of the IdP.
- subject_
match_ strattribute Okta user profile attribute for matching transformed IdP username. Only for matchType
"CUSTOM_ATTRIBUTE".- subject_
match_ strtype Determines the Okta user profile attribute match conditions for account linking and authentication of the transformed IdP username. By default it is set to
"USERNAME". It can be set to"USERNAME","EMAIL","USERNAME_OR_EMAIL"or"CUSTOM_ATTRIBUTE".- suspended_
action str Action for a previously suspended IdP user during authentication. Can be set to
"NONE"or"UNSUSPEND"- user_
info_ strbinding - user_
info_ strurl Protected resource endpoint that returns claims about the authenticated user.
- username_
template str Okta EL Expression to generate or transform a unique username for the IdP user.
Outputs
All input properties are implicitly available as output properties. Additionally, the Oidc resource produces the following output properties:
Look up an Existing Oidc Resource
Get an existing Oidc resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: OidcState, opts?: CustomResourceOptions): Oidcstatic get(resource_name, id, opts=None, account_link_action=None, account_link_group_includes=None, acs_binding=None, acs_type=None, authorization_binding=None, authorization_url=None, client_id=None, client_secret=None, deprovisioned_action=None, groups_action=None, groups_assignments=None, groups_attribute=None, groups_filters=None, issuer_mode=None, issuer_url=None, jwks_binding=None, jwks_url=None, max_clock_skew=None, name=None, profile_master=None, protocol_type=None, provisioning_action=None, request_signature_algorithm=None, request_signature_scope=None, response_signature_algorithm=None, response_signature_scope=None, scopes=None, status=None, subject_match_attribute=None, subject_match_type=None, suspended_action=None, token_binding=None, token_url=None, type=None, user_info_binding=None, user_info_url=None, username_template=None, __props__=None);public static Oidc Get(string name, Input<string> id, OidcState? state, CustomResourceOptions? opts = null)- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
The following state arguments are supported:
- Account
Link stringAction Specifies the account linking action for an IdP user.
- Account
Link List<string>Group Includes Group memberships to determine link candidates.
- Acs
Binding string The method of making an ACS request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- Acs
Type string The type of ACS. Default is
"INSTANCE".- string
The method of making an authorization request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- string
IdP Authorization Server (AS) endpoint to request consent from the user and obtain an authorization code grant.
- Client
Id string Unique identifier issued by AS for the Okta IdP instance.
- Client
Secret string Client secret issued by AS for the Okta IdP instance.
- Deprovisioned
Action string Action for a previously deprovisioned IdP user during authentication. Can be
"NONE"or"REACTIVATE".- Groups
Action string Provisioning action for IdP user’s group memberships. It can be
"NONE","SYNC","APPEND", or"ASSIGN".- Groups
Assignments List<string> List of Okta Group IDs to add an IdP user as a member with the
"ASSIGN"groups_action.- Groups
Attribute string IdP user profile attribute name (case-insensitive) for an array value that contains group memberships.
- Groups
Filters List<string> Whitelist of Okta Group identifiers that are allowed for the
"APPEND"or"SYNC"groups_action.- Issuer
Mode string Indicates whether Okta uses the original Okta org domain URL, or a custom domain URL. It can be
"ORG_URL"or"CUSTOM_URL".- Issuer
Url string URI that identifies the issuer.
- Jwks
Binding string The method of making a request for the OIDC JWKS. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- Jwks
Url string Endpoint where the signer of the keys publishes its keys in a JWK Set.
- Max
Clock intSkew Maximum allowable clock-skew when processing messages from the IdP.
- Name string
The Application’s display name.
- Profile
Master bool Determines if the IdP should act as a source of truth for user profile attributes.
- Protocol
Type string The type of protocol to use. It can be
"OIDC"or"OAUTH2".- Provisioning
Action string Provisioning action for an IdP user during authentication.
- Request
Signature stringAlgorithm algorithm to use to sign requests
- Request
Signature stringScope algorithm to use to sign response
- Response
Signature stringAlgorithm algorithm to use to sign requests
- Response
Signature stringScope algorithm to use to sign response
- Scopes List<string>
The scopes of the IdP.
- Status string
Status of the IdP.
- Subject
Match stringAttribute Okta user profile attribute for matching transformed IdP username. Only for matchType
"CUSTOM_ATTRIBUTE".- Subject
Match stringType Determines the Okta user profile attribute match conditions for account linking and authentication of the transformed IdP username. By default it is set to
"USERNAME". It can be set to"USERNAME","EMAIL","USERNAME_OR_EMAIL"or"CUSTOM_ATTRIBUTE".- Suspended
Action string Action for a previously suspended IdP user during authentication. Can be set to
"NONE"or"UNSUSPEND"- Token
Binding string The method of making a token request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- Token
Url string IdP Authorization Server (AS) endpoint to exchange the authorization code grant for an access token.
- Type string
Type of OIDC IdP.
- User
Info stringBinding - User
Info stringUrl Protected resource endpoint that returns claims about the authenticated user.
- Username
Template string Okta EL Expression to generate or transform a unique username for the IdP user.
- Account
Link stringAction Specifies the account linking action for an IdP user.
- Account
Link []stringGroup Includes Group memberships to determine link candidates.
- Acs
Binding string The method of making an ACS request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- Acs
Type string The type of ACS. Default is
"INSTANCE".- string
The method of making an authorization request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- string
IdP Authorization Server (AS) endpoint to request consent from the user and obtain an authorization code grant.
- Client
Id string Unique identifier issued by AS for the Okta IdP instance.
- Client
Secret string Client secret issued by AS for the Okta IdP instance.
- Deprovisioned
Action string Action for a previously deprovisioned IdP user during authentication. Can be
"NONE"or"REACTIVATE".- Groups
Action string Provisioning action for IdP user’s group memberships. It can be
"NONE","SYNC","APPEND", or"ASSIGN".- Groups
Assignments []string List of Okta Group IDs to add an IdP user as a member with the
"ASSIGN"groups_action.- Groups
Attribute string IdP user profile attribute name (case-insensitive) for an array value that contains group memberships.
- Groups
Filters []string Whitelist of Okta Group identifiers that are allowed for the
"APPEND"or"SYNC"groups_action.- Issuer
Mode string Indicates whether Okta uses the original Okta org domain URL, or a custom domain URL. It can be
"ORG_URL"or"CUSTOM_URL".- Issuer
Url string URI that identifies the issuer.
- Jwks
Binding string The method of making a request for the OIDC JWKS. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- Jwks
Url string Endpoint where the signer of the keys publishes its keys in a JWK Set.
- Max
Clock intSkew Maximum allowable clock-skew when processing messages from the IdP.
- Name string
The Application’s display name.
- Profile
Master bool Determines if the IdP should act as a source of truth for user profile attributes.
- Protocol
Type string The type of protocol to use. It can be
"OIDC"or"OAUTH2".- Provisioning
Action string Provisioning action for an IdP user during authentication.
- Request
Signature stringAlgorithm algorithm to use to sign requests
- Request
Signature stringScope algorithm to use to sign response
- Response
Signature stringAlgorithm algorithm to use to sign requests
- Response
Signature stringScope algorithm to use to sign response
- Scopes []string
The scopes of the IdP.
- Status string
Status of the IdP.
- Subject
Match stringAttribute Okta user profile attribute for matching transformed IdP username. Only for matchType
"CUSTOM_ATTRIBUTE".- Subject
Match stringType Determines the Okta user profile attribute match conditions for account linking and authentication of the transformed IdP username. By default it is set to
"USERNAME". It can be set to"USERNAME","EMAIL","USERNAME_OR_EMAIL"or"CUSTOM_ATTRIBUTE".- Suspended
Action string Action for a previously suspended IdP user during authentication. Can be set to
"NONE"or"UNSUSPEND"- Token
Binding string The method of making a token request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- Token
Url string IdP Authorization Server (AS) endpoint to exchange the authorization code grant for an access token.
- Type string
Type of OIDC IdP.
- User
Info stringBinding - User
Info stringUrl Protected resource endpoint that returns claims about the authenticated user.
- Username
Template string Okta EL Expression to generate or transform a unique username for the IdP user.
- account
Link stringAction Specifies the account linking action for an IdP user.
- account
Link string[]Group Includes Group memberships to determine link candidates.
- acs
Binding string The method of making an ACS request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- acs
Type string The type of ACS. Default is
"INSTANCE".- string
The method of making an authorization request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- string
IdP Authorization Server (AS) endpoint to request consent from the user and obtain an authorization code grant.
- client
Id string Unique identifier issued by AS for the Okta IdP instance.
- client
Secret string Client secret issued by AS for the Okta IdP instance.
- deprovisioned
Action string Action for a previously deprovisioned IdP user during authentication. Can be
"NONE"or"REACTIVATE".- groups
Action string Provisioning action for IdP user’s group memberships. It can be
"NONE","SYNC","APPEND", or"ASSIGN".- groups
Assignments string[] List of Okta Group IDs to add an IdP user as a member with the
"ASSIGN"groups_action.- groups
Attribute string IdP user profile attribute name (case-insensitive) for an array value that contains group memberships.
- groups
Filters string[] Whitelist of Okta Group identifiers that are allowed for the
"APPEND"or"SYNC"groups_action.- issuer
Mode string Indicates whether Okta uses the original Okta org domain URL, or a custom domain URL. It can be
"ORG_URL"or"CUSTOM_URL".- issuer
Url string URI that identifies the issuer.
- jwks
Binding string The method of making a request for the OIDC JWKS. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- jwks
Url string Endpoint where the signer of the keys publishes its keys in a JWK Set.
- max
Clock numberSkew Maximum allowable clock-skew when processing messages from the IdP.
- name string
The Application’s display name.
- profile
Master boolean Determines if the IdP should act as a source of truth for user profile attributes.
- protocol
Type string The type of protocol to use. It can be
"OIDC"or"OAUTH2".- provisioning
Action string Provisioning action for an IdP user during authentication.
- request
Signature stringAlgorithm algorithm to use to sign requests
- request
Signature stringScope algorithm to use to sign response
- response
Signature stringAlgorithm algorithm to use to sign requests
- response
Signature stringScope algorithm to use to sign response
- scopes string[]
The scopes of the IdP.
- status string
Status of the IdP.
- subject
Match stringAttribute Okta user profile attribute for matching transformed IdP username. Only for matchType
"CUSTOM_ATTRIBUTE".- subject
Match stringType Determines the Okta user profile attribute match conditions for account linking and authentication of the transformed IdP username. By default it is set to
"USERNAME". It can be set to"USERNAME","EMAIL","USERNAME_OR_EMAIL"or"CUSTOM_ATTRIBUTE".- suspended
Action string Action for a previously suspended IdP user during authentication. Can be set to
"NONE"or"UNSUSPEND"- token
Binding string The method of making a token request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- token
Url string IdP Authorization Server (AS) endpoint to exchange the authorization code grant for an access token.
- type string
Type of OIDC IdP.
- user
Info stringBinding - user
Info stringUrl Protected resource endpoint that returns claims about the authenticated user.
- username
Template string Okta EL Expression to generate or transform a unique username for the IdP user.
- account_
link_ straction Specifies the account linking action for an IdP user.
- account_
link_ List[str]group_ includes Group memberships to determine link candidates.
- acs_
binding str The method of making an ACS request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- acs_
type str The type of ACS. Default is
"INSTANCE".- str
The method of making an authorization request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- str
IdP Authorization Server (AS) endpoint to request consent from the user and obtain an authorization code grant.
- client_
id str Unique identifier issued by AS for the Okta IdP instance.
- client_
secret str Client secret issued by AS for the Okta IdP instance.
- deprovisioned_
action str Action for a previously deprovisioned IdP user during authentication. Can be
"NONE"or"REACTIVATE".- groups_
action str Provisioning action for IdP user’s group memberships. It can be
"NONE","SYNC","APPEND", or"ASSIGN".- groups_
assignments List[str] List of Okta Group IDs to add an IdP user as a member with the
"ASSIGN"groups_action.- groups_
attribute str IdP user profile attribute name (case-insensitive) for an array value that contains group memberships.
- groups_
filters List[str] Whitelist of Okta Group identifiers that are allowed for the
"APPEND"or"SYNC"groups_action.- issuer_
mode str Indicates whether Okta uses the original Okta org domain URL, or a custom domain URL. It can be
"ORG_URL"or"CUSTOM_URL".- issuer_
url str URI that identifies the issuer.
- jwks_
binding str The method of making a request for the OIDC JWKS. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- jwks_
url str Endpoint where the signer of the keys publishes its keys in a JWK Set.
- max_
clock_ floatskew Maximum allowable clock-skew when processing messages from the IdP.
- name str
The Application’s display name.
- profile_
master bool Determines if the IdP should act as a source of truth for user profile attributes.
- protocol_
type str The type of protocol to use. It can be
"OIDC"or"OAUTH2".- provisioning_
action str Provisioning action for an IdP user during authentication.
- request_
signature_ stralgorithm algorithm to use to sign requests
- request_
signature_ strscope algorithm to use to sign response
- response_
signature_ stralgorithm algorithm to use to sign requests
- response_
signature_ strscope algorithm to use to sign response
- scopes List[str]
The scopes of the IdP.
- status str
Status of the IdP.
- subject_
match_ strattribute Okta user profile attribute for matching transformed IdP username. Only for matchType
"CUSTOM_ATTRIBUTE".- subject_
match_ strtype Determines the Okta user profile attribute match conditions for account linking and authentication of the transformed IdP username. By default it is set to
"USERNAME". It can be set to"USERNAME","EMAIL","USERNAME_OR_EMAIL"or"CUSTOM_ATTRIBUTE".- suspended_
action str Action for a previously suspended IdP user during authentication. Can be set to
"NONE"or"UNSUSPEND"- token_
binding str The method of making a token request. It can be set to
"HTTP-POST"or"HTTP-REDIRECT".- token_
url str IdP Authorization Server (AS) endpoint to exchange the authorization code grant for an access token.
- type str
Type of OIDC IdP.
- user_
info_ strbinding - user_
info_ strurl Protected resource endpoint that returns claims about the authenticated user.
- username_
template str Okta EL Expression to generate or transform a unique username for the IdP user.
Package Details
- Repository
- https://github.com/pulumi/pulumi-okta
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
oktaTerraform Provider.