SAML 2.0 sign-on attributes. > Note: Set either destinationOverride or ssoAcsUrl to configure any other SAML 2.0 attributes in this section.
| Name | Type | Description | Notes |
|---|---|---|---|
| acs_endpoints | List[AcsEndpoint] | An array of ACS endpoints. You can configure a maximum of 100 endpoints. | [optional] |
| allow_multiple_acs_endpoints | bool | Determines whether the app allows you to configure multiple ACS URIs | |
| assertion_encryption | SamlAssertionEncryption | [optional] | |
| assertion_signed | bool | Determines whether the SAML assertion is digitally signed | |
| attribute_statements | List[SamlAttributeStatement] | A list of custom attribute statements for the app's SAML assertion. See SAML 2.0 Technical Overview. There are two types of attribute statements: | Type |
| audience | str | The entity ID of the SP. Use the entity ID value exactly as provided by the SP. | |
| audience_override | str | Audience override for CASB configuration. See CASB config guide. | [optional] |
| authn_context_class_ref | str | Identifies the SAML authentication context class for the assertion's authentication statement | |
| configured_attribute_statements | List[SamlAttributeStatement] | The list of dynamic attribute statements for the SAML assertion inherited from app metadata (apps from the OIN) during app creation. There are two types of attribute statements: `EXPRESSION` and `GROUP`. | [optional] |
| default_relay_state | str | Identifies a specific application resource in an IdP-initiated SSO scenario | [optional] |
| destination | str | Identifies the location inside the SAML assertion where the SAML response should be sent | |
| destination_override | str | Destination override for CASB configuration. See CASB config guide. | [optional] |
| digest_algorithm | str | Determines the digest algorithm used to digitally sign the SAML assertion and response | |
| honor_force_authn | bool | Set to `true` to prompt users for their credentials when a SAML request has the `ForceAuthn` attribute set to `true` | |
| idp_issuer | str | SAML Issuer ID | |
| inline_hooks | List[SignOnInlineHook] | Associates the app with SAML inline hooks. See the SAML assertion inline hook reference. | [optional] |
| participate_slo | SloParticipate | [optional] | |
| recipient | str | The location where the app may present the SAML assertion | |
| recipient_override | str | Recipient override for CASB configuration. See CASB config guide. | [optional] |
| request_compressed | bool | Determines whether the SAML request is expected to be compressed | |
| response_signed | bool | Determines whether the SAML authentication response message is digitally signed by the IdP > Note: Either (or both) `responseSigned` or `assertionSigned` must be `TRUE`. | |
| saml_assertion_lifetime_seconds | int | Determines the SAML app session lifetimes with Okta | [optional] |
| signature_algorithm | str | Determines the signing algorithm used to digitally sign the SAML assertion and response | |
| slo | SingleLogout | [optional] | |
| sp_certificate | SamlSpCertificate | [optional] | |
| sp_issuer | str | The issuer ID for the Service Provider. This property appears when SLO is enabled. | [optional] |
| sso_acs_url | str | Single Sign-On Assertion Consumer Service (ACS) URL | |
| sso_acs_url_override | str | Assertion Consumer Service (ACS) URL override for CASB configuration. See CASB config guide. | [optional] |
| subject_name_id_format | str | Identifies the SAML processing rules. Supported values: | |
| subject_name_id_template | str | Template for app user's username when a user is assigned to the app |
from okta.models.saml_application_settings_sign_on import SamlApplicationSettingsSignOn
# TODO update the JSON string below
json = "{}"
# create an instance of SamlApplicationSettingsSignOn from a JSON string
saml_application_settings_sign_on_instance = SamlApplicationSettingsSignOn.from_json(json)
# print the JSON string representation of the object
print(SamlApplicationSettingsSignOn.to_json())
# convert the object into a dict
saml_application_settings_sign_on_dict = saml_application_settings_sign_on_instance.to_dict()
# create an instance of SamlApplicationSettingsSignOn from a dict
saml_application_settings_sign_on_from_dict = SamlApplicationSettingsSignOn.from_dict(saml_application_settings_sign_on_dict)