Resource: InboundSamlConfig
A pair of SAML RP-IDP configurations when the project acts as the relying party.
| JSON representation | 
|---|
{ "name": string, "idpConfig": { object (  | 
              
| Fields | |
|---|---|
name | 
                
                   
 The name of the InboundSamlConfig resource, for example: 'projects/my-awesome-project/inboundSamlConfigs/my-config-id'. Ignored during create requests.  | 
              
idpConfig | 
                
                   
 The SAML IdP (Identity Provider) configuration when the project acts as the relying party.  | 
              
spConfig | 
                
                   
 The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider.  | 
              
displayName | 
                
                   
 The config's display name set by developers.  | 
              
enabled | 
                
                   
 True if allows the user to sign in with the provider.  | 
              
IdpConfig
The SAML IdP (Identity Provider) configuration when the project acts as the relying party.
| JSON representation | 
|---|
{
  "idpEntityId": string,
  "ssoUrl": string,
  "idpCertificates": [
    {
      object ( | 
                
| Fields | |
|---|---|
idpEntityId | 
                  
                     
 Unique identifier for all SAML entities.  | 
                
ssoUrl | 
                  
                     
 URL to send Authentication request to.  | 
                
idpCertificates[] | 
                  
                     
 IDP's public keys for verifying signature in the assertions.  | 
                
signRequest | 
                  
                     
 Indicates if outbounding SAMLRequest should be signed.  | 
                
IdpCertificate
The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP.
| JSON representation | 
|---|
{ "x509Certificate": string }  | 
                
| Fields | |
|---|---|
x509Certificate | 
                  
                     
 The x509 certificate  | 
                
SpConfig
The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider.
| JSON representation | 
|---|
{
  "spEntityId": string,
  "callbackUri": string,
  "spCertificates": [
    {
      object ( | 
                
| Fields | |
|---|---|
spEntityId | 
                  
                     
 Unique identifier for all SAML entities.  | 
                
callbackUri | 
                  
                     
 Callback URI where responses from IDP are handled.  | 
                
spCertificates[] | 
                  
                     
 Output only. Public certificates generated by the server to verify the signature in SAMLRequest in the SP-initiated flow.  | 
                
SpCertificate
The SP's certificate data for IDP to verify the SAMLRequest generated by the SP.
| JSON representation | 
|---|
{ "x509Certificate": string, "expiresAt": string }  | 
                
| Fields | |
|---|---|
x509Certificate | 
                  
                     
 Self-signed public certificate.  | 
                
expiresAt | 
                  
                     
 Timestamp of the cert expiration instance. Uses RFC 3339, where generated output will always be Z-normalized and uses 0, 3, 6 or 9 fractional digits. Offsets other than "Z" are also accepted. Examples:   | 
                
Methods | 
            |
|---|---|
                
 | 
              Create an inbound SAML configuration for an Identity Toolkit project. | 
                
 | 
              Delete an inbound SAML configuration for an Identity Toolkit project. | 
                
 | 
              Retrieve an inbound SAML configuration for an Identity Toolkit project. | 
                
 | 
              List all inbound SAML configurations for an Identity Toolkit project. | 
                
 | 
              Update an inbound SAML configuration for an Identity Toolkit project. |