Skip to content

Latest commit

 

History

History
59 lines (50 loc) · 5.66 KB

File metadata and controls

59 lines (50 loc) · 5.66 KB

SamlApplicationSettingsSignOn

SAML 2.0 sign-on attributes. > Note: Set either destinationOverride or ssoAcsUrl to configure any other SAML 2.0 attributes in this section.

Properties

Name Type Description Notes
acs_endpoints List[AcsEndpoint] An array of ACS endpoints. You can configure a maximum of 100 endpoints. [optional]
allow_multiple_acs_endpoints bool Determines whether the app allows you to configure multiple ACS URIs
assertion_encryption SamlAssertionEncryption [optional]
assertion_signed bool Determines whether the SAML assertion is digitally signed
attribute_statements List[SamlAttributeStatement] A list of custom attribute statements for the app's SAML assertion. See SAML 2.0 Technical Overview. There are two types of attribute statements: Type
audience str The entity ID of the SP. Use the entity ID value exactly as provided by the SP.
audience_override str Audience override for CASB configuration. See CASB config guide. [optional]
authn_context_class_ref str Identifies the SAML authentication context class for the assertion's authentication statement
configured_attribute_statements List[SamlAttributeStatement] The list of dynamic attribute statements for the SAML assertion inherited from app metadata (apps from the OIN) during app creation. There are two types of attribute statements: `EXPRESSION` and `GROUP`. [optional]
default_relay_state str Identifies a specific application resource in an IdP-initiated SSO scenario [optional]
destination str Identifies the location inside the SAML assertion where the SAML response should be sent
destination_override str Destination override for CASB configuration. See CASB config guide. [optional]
digest_algorithm str Determines the digest algorithm used to digitally sign the SAML assertion and response
honor_force_authn bool Set to `true` to prompt users for their credentials when a SAML request has the `ForceAuthn` attribute set to `true`
idp_issuer str SAML Issuer ID
inline_hooks List[SignOnInlineHook] Associates the app with SAML inline hooks. See the SAML assertion inline hook reference. [optional]
participate_slo SloParticipate [optional]
recipient str The location where the app may present the SAML assertion
recipient_override str Recipient override for CASB configuration. See CASB config guide. [optional]
request_compressed bool Determines whether the SAML request is expected to be compressed
response_signed bool Determines whether the SAML authentication response message is digitally signed by the IdP > Note: Either (or both) `responseSigned` or `assertionSigned` must be `TRUE`.
saml_assertion_lifetime_seconds int Determines the SAML app session lifetimes with Okta [optional]
signature_algorithm str Determines the signing algorithm used to digitally sign the SAML assertion and response
slo SingleLogout [optional]
sp_certificate SamlSpCertificate [optional]
sp_issuer str The issuer ID for the Service Provider. This property appears when SLO is enabled. [optional]
sso_acs_url str Single Sign-On Assertion Consumer Service (ACS) URL
sso_acs_url_override str Assertion Consumer Service (ACS) URL override for CASB configuration. See CASB config guide. [optional]
subject_name_id_format str Identifies the SAML processing rules. Supported values:
subject_name_id_template str Template for app user's username when a user is assigned to the app

Example

from okta.models.saml_application_settings_sign_on import SamlApplicationSettingsSignOn

# TODO update the JSON string below
json = "{}"
# create an instance of SamlApplicationSettingsSignOn from a JSON string
saml_application_settings_sign_on_instance = SamlApplicationSettingsSignOn.from_json(json)
# print the JSON string representation of the object
print(SamlApplicationSettingsSignOn.to_json())

# convert the object into a dict
saml_application_settings_sign_on_dict = saml_application_settings_sign_on_instance.to_dict()
# create an instance of SamlApplicationSettingsSignOn from a dict
saml_application_settings_sign_on_from_dict = SamlApplicationSettingsSignOn.from_dict(saml_application_settings_sign_on_dict)

[Back to Model list] [Back to API list] [Back to README]