gcp.identityplatform.InboundSamlConfig
Explore with Pulumi AI
Inbound SAML configuration for a Identity Toolkit project.
You must enable the Google Identity Platform in the marketplace prior to using this resource.
Example Usage
Identity Platform Inbound Saml Config Basic
import * as pulumi from "@pulumi/pulumi";
import * as gcp from "@pulumi/gcp";
import * as std from "@pulumi/std";
const samlConfig = new gcp.identityplatform.InboundSamlConfig("saml_config", {
name: "saml.tf-config",
displayName: "Display Name",
idpConfig: {
idpEntityId: "tf-idp",
signRequest: true,
ssoUrl: "https://example.com",
idpCertificates: [{
x509Certificate: std.file({
input: "test-fixtures/rsa_cert.pem",
}).then(invoke => invoke.result),
}],
},
spConfig: {
spEntityId: "tf-sp",
callbackUri: "https://example.com",
},
});
import pulumi
import pulumi_gcp as gcp
import pulumi_std as std
saml_config = gcp.identityplatform.InboundSamlConfig("saml_config",
name="saml.tf-config",
display_name="Display Name",
idp_config=gcp.identityplatform.InboundSamlConfigIdpConfigArgs(
idp_entity_id="tf-idp",
sign_request=True,
sso_url="https://example.com",
idp_certificates=[gcp.identityplatform.InboundSamlConfigIdpConfigIdpCertificateArgs(
x509_certificate=std.file(input="test-fixtures/rsa_cert.pem").result,
)],
),
sp_config=gcp.identityplatform.InboundSamlConfigSpConfigArgs(
sp_entity_id="tf-sp",
callback_uri="https://example.com",
))
package main
import (
"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/identityplatform"
"github.com/pulumi/pulumi-std/sdk/go/std"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
invokeFile, err := std.File(ctx, &std.FileArgs{
Input: "test-fixtures/rsa_cert.pem",
}, nil)
if err != nil {
return err
}
_, err = identityplatform.NewInboundSamlConfig(ctx, "saml_config", &identityplatform.InboundSamlConfigArgs{
Name: pulumi.String("saml.tf-config"),
DisplayName: pulumi.String("Display Name"),
IdpConfig: &identityplatform.InboundSamlConfigIdpConfigArgs{
IdpEntityId: pulumi.String("tf-idp"),
SignRequest: pulumi.Bool(true),
SsoUrl: pulumi.String("https://example.com"),
IdpCertificates: identityplatform.InboundSamlConfigIdpConfigIdpCertificateArray{
&identityplatform.InboundSamlConfigIdpConfigIdpCertificateArgs{
X509Certificate: invokeFile.Result,
},
},
},
SpConfig: &identityplatform.InboundSamlConfigSpConfigArgs{
SpEntityId: pulumi.String("tf-sp"),
CallbackUri: pulumi.String("https://example.com"),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Gcp = Pulumi.Gcp;
using Std = Pulumi.Std;
return await Deployment.RunAsync(() =>
{
var samlConfig = new Gcp.IdentityPlatform.InboundSamlConfig("saml_config", new()
{
Name = "saml.tf-config",
DisplayName = "Display Name",
IdpConfig = new Gcp.IdentityPlatform.Inputs.InboundSamlConfigIdpConfigArgs
{
IdpEntityId = "tf-idp",
SignRequest = true,
SsoUrl = "https://example.com",
IdpCertificates = new[]
{
new Gcp.IdentityPlatform.Inputs.InboundSamlConfigIdpConfigIdpCertificateArgs
{
X509Certificate = Std.File.Invoke(new()
{
Input = "test-fixtures/rsa_cert.pem",
}).Apply(invoke => invoke.Result),
},
},
},
SpConfig = new Gcp.IdentityPlatform.Inputs.InboundSamlConfigSpConfigArgs
{
SpEntityId = "tf-sp",
CallbackUri = "https://example.com",
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.identityplatform.InboundSamlConfig;
import com.pulumi.gcp.identityplatform.InboundSamlConfigArgs;
import com.pulumi.gcp.identityplatform.inputs.InboundSamlConfigIdpConfigArgs;
import com.pulumi.gcp.identityplatform.inputs.InboundSamlConfigSpConfigArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var samlConfig = new InboundSamlConfig("samlConfig", InboundSamlConfigArgs.builder()
.name("saml.tf-config")
.displayName("Display Name")
.idpConfig(InboundSamlConfigIdpConfigArgs.builder()
.idpEntityId("tf-idp")
.signRequest(true)
.ssoUrl("https://example.com")
.idpCertificates(InboundSamlConfigIdpConfigIdpCertificateArgs.builder()
.x509Certificate(StdFunctions.file(FileArgs.builder()
.input("test-fixtures/rsa_cert.pem")
.build()).result())
.build())
.build())
.spConfig(InboundSamlConfigSpConfigArgs.builder()
.spEntityId("tf-sp")
.callbackUri("https://example.com")
.build())
.build());
}
}
resources:
samlConfig:
type: gcp:identityplatform:InboundSamlConfig
name: saml_config
properties:
name: saml.tf-config
displayName: Display Name
idpConfig:
idpEntityId: tf-idp
signRequest: true
ssoUrl: https://example.com
idpCertificates:
- x509Certificate:
fn::invoke:
Function: std:file
Arguments:
input: test-fixtures/rsa_cert.pem
Return: result
spConfig:
spEntityId: tf-sp
callbackUri: https://example.com
Create InboundSamlConfig Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new InboundSamlConfig(name: string, args: InboundSamlConfigArgs, opts?: CustomResourceOptions);
@overload
def InboundSamlConfig(resource_name: str,
args: InboundSamlConfigArgs,
opts: Optional[ResourceOptions] = None)
@overload
def InboundSamlConfig(resource_name: str,
opts: Optional[ResourceOptions] = None,
display_name: Optional[str] = None,
idp_config: Optional[InboundSamlConfigIdpConfigArgs] = None,
sp_config: Optional[InboundSamlConfigSpConfigArgs] = None,
enabled: Optional[bool] = None,
name: Optional[str] = None,
project: Optional[str] = None)
func NewInboundSamlConfig(ctx *Context, name string, args InboundSamlConfigArgs, opts ...ResourceOption) (*InboundSamlConfig, error)
public InboundSamlConfig(string name, InboundSamlConfigArgs args, CustomResourceOptions? opts = null)
public InboundSamlConfig(String name, InboundSamlConfigArgs args)
public InboundSamlConfig(String name, InboundSamlConfigArgs args, CustomResourceOptions options)
type: gcp:identityplatform:InboundSamlConfig
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args InboundSamlConfigArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args InboundSamlConfigArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args InboundSamlConfigArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args InboundSamlConfigArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args InboundSamlConfigArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var inboundSamlConfigResource = new Gcp.IdentityPlatform.InboundSamlConfig("inboundSamlConfigResource", new()
{
DisplayName = "string",
IdpConfig = new Gcp.IdentityPlatform.Inputs.InboundSamlConfigIdpConfigArgs
{
IdpCertificates = new[]
{
new Gcp.IdentityPlatform.Inputs.InboundSamlConfigIdpConfigIdpCertificateArgs
{
X509Certificate = "string",
},
},
IdpEntityId = "string",
SsoUrl = "string",
SignRequest = false,
},
SpConfig = new Gcp.IdentityPlatform.Inputs.InboundSamlConfigSpConfigArgs
{
CallbackUri = "string",
SpCertificates = new[]
{
new Gcp.IdentityPlatform.Inputs.InboundSamlConfigSpConfigSpCertificateArgs
{
X509Certificate = "string",
},
},
SpEntityId = "string",
},
Enabled = false,
Name = "string",
Project = "string",
});
example, err := identityplatform.NewInboundSamlConfig(ctx, "inboundSamlConfigResource", &identityplatform.InboundSamlConfigArgs{
DisplayName: pulumi.String("string"),
IdpConfig: &identityplatform.InboundSamlConfigIdpConfigArgs{
IdpCertificates: identityplatform.InboundSamlConfigIdpConfigIdpCertificateArray{
&identityplatform.InboundSamlConfigIdpConfigIdpCertificateArgs{
X509Certificate: pulumi.String("string"),
},
},
IdpEntityId: pulumi.String("string"),
SsoUrl: pulumi.String("string"),
SignRequest: pulumi.Bool(false),
},
SpConfig: &identityplatform.InboundSamlConfigSpConfigArgs{
CallbackUri: pulumi.String("string"),
SpCertificates: identityplatform.InboundSamlConfigSpConfigSpCertificateArray{
&identityplatform.InboundSamlConfigSpConfigSpCertificateArgs{
X509Certificate: pulumi.String("string"),
},
},
SpEntityId: pulumi.String("string"),
},
Enabled: pulumi.Bool(false),
Name: pulumi.String("string"),
Project: pulumi.String("string"),
})
var inboundSamlConfigResource = new InboundSamlConfig("inboundSamlConfigResource", InboundSamlConfigArgs.builder()
.displayName("string")
.idpConfig(InboundSamlConfigIdpConfigArgs.builder()
.idpCertificates(InboundSamlConfigIdpConfigIdpCertificateArgs.builder()
.x509Certificate("string")
.build())
.idpEntityId("string")
.ssoUrl("string")
.signRequest(false)
.build())
.spConfig(InboundSamlConfigSpConfigArgs.builder()
.callbackUri("string")
.spCertificates(InboundSamlConfigSpConfigSpCertificateArgs.builder()
.x509Certificate("string")
.build())
.spEntityId("string")
.build())
.enabled(false)
.name("string")
.project("string")
.build());
inbound_saml_config_resource = gcp.identityplatform.InboundSamlConfig("inboundSamlConfigResource",
display_name="string",
idp_config=gcp.identityplatform.InboundSamlConfigIdpConfigArgs(
idp_certificates=[gcp.identityplatform.InboundSamlConfigIdpConfigIdpCertificateArgs(
x509_certificate="string",
)],
idp_entity_id="string",
sso_url="string",
sign_request=False,
),
sp_config=gcp.identityplatform.InboundSamlConfigSpConfigArgs(
callback_uri="string",
sp_certificates=[gcp.identityplatform.InboundSamlConfigSpConfigSpCertificateArgs(
x509_certificate="string",
)],
sp_entity_id="string",
),
enabled=False,
name="string",
project="string")
const inboundSamlConfigResource = new gcp.identityplatform.InboundSamlConfig("inboundSamlConfigResource", {
displayName: "string",
idpConfig: {
idpCertificates: [{
x509Certificate: "string",
}],
idpEntityId: "string",
ssoUrl: "string",
signRequest: false,
},
spConfig: {
callbackUri: "string",
spCertificates: [{
x509Certificate: "string",
}],
spEntityId: "string",
},
enabled: false,
name: "string",
project: "string",
});
type: gcp:identityplatform:InboundSamlConfig
properties:
displayName: string
enabled: false
idpConfig:
idpCertificates:
- x509Certificate: string
idpEntityId: string
signRequest: false
ssoUrl: string
name: string
project: string
spConfig:
callbackUri: string
spCertificates:
- x509Certificate: string
spEntityId: string
InboundSamlConfig Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The InboundSamlConfig resource accepts the following input properties:
- Display
Name string - Human friendly display name.
- Idp
Config InboundSaml Config Idp Config - SAML IdP configuration when the project acts as the relying party Structure is documented below.
- Sp
Config InboundSaml Config Sp Config - SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- Enabled bool
- If this config allows users to sign in with the provider.
- Name string
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
- Display
Name string - Human friendly display name.
- Idp
Config InboundSaml Config Idp Config Args - SAML IdP configuration when the project acts as the relying party Structure is documented below.
- Sp
Config InboundSaml Config Sp Config Args - SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- Enabled bool
- If this config allows users to sign in with the provider.
- Name string
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
- display
Name String - Human friendly display name.
- idp
Config InboundSaml Config Idp Config - SAML IdP configuration when the project acts as the relying party Structure is documented below.
- sp
Config InboundSaml Config Sp Config - SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- enabled Boolean
- If this config allows users to sign in with the provider.
- name String
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project String
- display
Name string - Human friendly display name.
- idp
Config InboundSaml Config Idp Config - SAML IdP configuration when the project acts as the relying party Structure is documented below.
- sp
Config InboundSaml Config Sp Config - SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- enabled boolean
- If this config allows users to sign in with the provider.
- name string
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project string
- display_
name str - Human friendly display name.
- idp_
config InboundSaml Config Idp Config Args - SAML IdP configuration when the project acts as the relying party Structure is documented below.
- sp_
config InboundSaml Config Sp Config Args - SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- enabled bool
- If this config allows users to sign in with the provider.
- name str
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project str
- display
Name String - Human friendly display name.
- idp
Config Property Map - SAML IdP configuration when the project acts as the relying party Structure is documented below.
- sp
Config Property Map - SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- enabled Boolean
- If this config allows users to sign in with the provider.
- name String
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project String
Outputs
All input properties are implicitly available as output properties. Additionally, the InboundSamlConfig resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing InboundSamlConfig Resource
Get an existing InboundSamlConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: InboundSamlConfigState, opts?: CustomResourceOptions): InboundSamlConfig
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
display_name: Optional[str] = None,
enabled: Optional[bool] = None,
idp_config: Optional[InboundSamlConfigIdpConfigArgs] = None,
name: Optional[str] = None,
project: Optional[str] = None,
sp_config: Optional[InboundSamlConfigSpConfigArgs] = None) -> InboundSamlConfig
func GetInboundSamlConfig(ctx *Context, name string, id IDInput, state *InboundSamlConfigState, opts ...ResourceOption) (*InboundSamlConfig, error)
public static InboundSamlConfig Get(string name, Input<string> id, InboundSamlConfigState? state, CustomResourceOptions? opts = null)
public static InboundSamlConfig get(String name, Output<String> id, InboundSamlConfigState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Display
Name string - Human friendly display name.
- Enabled bool
- If this config allows users to sign in with the provider.
- Idp
Config InboundSaml Config Idp Config - SAML IdP configuration when the project acts as the relying party Structure is documented below.
- Name string
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
- Sp
Config InboundSaml Config Sp Config - SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- Display
Name string - Human friendly display name.
- Enabled bool
- If this config allows users to sign in with the provider.
- Idp
Config InboundSaml Config Idp Config Args - SAML IdP configuration when the project acts as the relying party Structure is documented below.
- Name string
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
- Sp
Config InboundSaml Config Sp Config Args - SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- display
Name String - Human friendly display name.
- enabled Boolean
- If this config allows users to sign in with the provider.
- idp
Config InboundSaml Config Idp Config - SAML IdP configuration when the project acts as the relying party Structure is documented below.
- name String
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project String
- sp
Config InboundSaml Config Sp Config - SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- display
Name string - Human friendly display name.
- enabled boolean
- If this config allows users to sign in with the provider.
- idp
Config InboundSaml Config Idp Config - SAML IdP configuration when the project acts as the relying party Structure is documented below.
- name string
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project string
- sp
Config InboundSaml Config Sp Config - SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- display_
name str - Human friendly display name.
- enabled bool
- If this config allows users to sign in with the provider.
- idp_
config InboundSaml Config Idp Config Args - SAML IdP configuration when the project acts as the relying party Structure is documented below.
- name str
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project str
- sp_
config InboundSaml Config Sp Config Args - SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- display
Name String - Human friendly display name.
- enabled Boolean
- If this config allows users to sign in with the provider.
- idp
Config Property Map - SAML IdP configuration when the project acts as the relying party Structure is documented below.
- name String
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project String
- sp
Config Property Map - SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
Supporting Types
InboundSamlConfigIdpConfig, InboundSamlConfigIdpConfigArgs
- Idp
Certificates List<InboundSaml Config Idp Config Idp Certificate> - The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- Idp
Entity stringId - Unique identifier for all SAML entities
- Sso
Url string - URL to send Authentication request to.
- Sign
Request bool - Indicates if outbounding SAMLRequest should be signed.
- Idp
Certificates []InboundSaml Config Idp Config Idp Certificate - The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- Idp
Entity stringId - Unique identifier for all SAML entities
- Sso
Url string - URL to send Authentication request to.
- Sign
Request bool - Indicates if outbounding SAMLRequest should be signed.
- idp
Certificates List<InboundSaml Config Idp Config Idp Certificate> - The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- idp
Entity StringId - Unique identifier for all SAML entities
- sso
Url String - URL to send Authentication request to.
- sign
Request Boolean - Indicates if outbounding SAMLRequest should be signed.
- idp
Certificates InboundSaml Config Idp Config Idp Certificate[] - The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- idp
Entity stringId - Unique identifier for all SAML entities
- sso
Url string - URL to send Authentication request to.
- sign
Request boolean - Indicates if outbounding SAMLRequest should be signed.
- idp_
certificates Sequence[InboundSaml Config Idp Config Idp Certificate] - The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- idp_
entity_ strid - Unique identifier for all SAML entities
- sso_
url str - URL to send Authentication request to.
- sign_
request bool - Indicates if outbounding SAMLRequest should be signed.
- idp
Certificates List<Property Map> - The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- idp
Entity StringId - Unique identifier for all SAML entities
- sso
Url String - URL to send Authentication request to.
- sign
Request Boolean - Indicates if outbounding SAMLRequest should be signed.
InboundSamlConfigIdpConfigIdpCertificate, InboundSamlConfigIdpConfigIdpCertificateArgs
- X509Certificate string
- The IdP's x509 certificate.
- X509Certificate string
- The IdP's x509 certificate.
- x509Certificate String
- The IdP's x509 certificate.
- x509Certificate string
- The IdP's x509 certificate.
- x509_
certificate str - The IdP's x509 certificate.
- x509Certificate String
- The IdP's x509 certificate.
InboundSamlConfigSpConfig, InboundSamlConfigSpConfigArgs
- Callback
Uri string - Callback URI where responses from IDP are handled. Must start with
https://
. - Sp
Certificates List<InboundSaml Config Sp Config Sp Certificate> (Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
The
sp_certificates
block contains:- Sp
Entity stringId - Unique identifier for all SAML entities.
- Callback
Uri string - Callback URI where responses from IDP are handled. Must start with
https://
. - Sp
Certificates []InboundSaml Config Sp Config Sp Certificate (Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
The
sp_certificates
block contains:- Sp
Entity stringId - Unique identifier for all SAML entities.
- callback
Uri String - Callback URI where responses from IDP are handled. Must start with
https://
. - sp
Certificates List<InboundSaml Config Sp Config Sp Certificate> (Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
The
sp_certificates
block contains:- sp
Entity StringId - Unique identifier for all SAML entities.
- callback
Uri string - Callback URI where responses from IDP are handled. Must start with
https://
. - sp
Certificates InboundSaml Config Sp Config Sp Certificate[] (Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
The
sp_certificates
block contains:- sp
Entity stringId - Unique identifier for all SAML entities.
- callback_
uri str - Callback URI where responses from IDP are handled. Must start with
https://
. - sp_
certificates Sequence[InboundSaml Config Sp Config Sp Certificate] (Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
The
sp_certificates
block contains:- sp_
entity_ strid - Unique identifier for all SAML entities.
- callback
Uri String - Callback URI where responses from IDP are handled. Must start with
https://
. - sp
Certificates List<Property Map> (Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
The
sp_certificates
block contains:- sp
Entity StringId - Unique identifier for all SAML entities.
InboundSamlConfigSpConfigSpCertificate, InboundSamlConfigSpConfigSpCertificateArgs
- X509Certificate string
- The x509 certificate
- X509Certificate string
- The x509 certificate
- x509Certificate String
- The x509 certificate
- x509Certificate string
- The x509 certificate
- x509_
certificate str - The x509 certificate
- x509Certificate String
- The x509 certificate
Import
InboundSamlConfig can be imported using any of these accepted formats:
projects/{{project}}/inboundSamlConfigs/{{name}}
{{project}}/{{name}}
{{name}}
When using the pulumi import
command, InboundSamlConfig can be imported using one of the formats above. For example:
$ pulumi import gcp:identityplatform/inboundSamlConfig:InboundSamlConfig default projects/{{project}}/inboundSamlConfigs/{{name}}
$ pulumi import gcp:identityplatform/inboundSamlConfig:InboundSamlConfig default {{project}}/{{name}}
$ pulumi import gcp:identityplatform/inboundSamlConfig:InboundSamlConfig default {{name}}
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Google Cloud (GCP) Classic pulumi/pulumi-gcp
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
google-beta
Terraform Provider.