GetZeroTrustAccessIdentityProvidersResultConfig

data class GetZeroTrustAccessIdentityProvidersResultConfig(val appsDomain: String, val attributes: List<String>, val authUrl: String, val authorizationServerId: String, val centrifyAccount: String, val centrifyAppId: String, val certsUrl: String, val claims: List<String>, val clientId: String, val clientSecret: String, val conditionalAccessEnabled: Boolean, val directoryId: String, val emailAttributeName: String, val emailClaimName: String, val headerAttributes: List<GetZeroTrustAccessIdentityProvidersResultConfigHeaderAttribute>, val idpPublicCerts: List<String>, val issuerUrl: String, val oktaAccount: String, val oneloginAccount: String, val pingEnvId: String, val pkceEnabled: Boolean, val prompt: String, val scopes: List<String>, val signRequest: Boolean, val ssoTargetUrl: String, val supportGroups: Boolean, val tokenUrl: String)

Constructors

constructor(appsDomain: String, attributes: List<String>, authUrl: String, authorizationServerId: String, centrifyAccount: String, centrifyAppId: String, certsUrl: String, claims: List<String>, clientId: String, clientSecret: String, conditionalAccessEnabled: Boolean, directoryId: String, emailAttributeName: String, emailClaimName: String, headerAttributes: List<GetZeroTrustAccessIdentityProvidersResultConfigHeaderAttribute>, idpPublicCerts: List<String>, issuerUrl: String, oktaAccount: String, oneloginAccount: String, pingEnvId: String, pkceEnabled: Boolean, prompt: String, scopes: List<String>, signRequest: Boolean, ssoTargetUrl: String, supportGroups: Boolean, tokenUrl: String)

Types

Link copied to clipboard
object Companion

Properties

Link copied to clipboard

Your companies TLD

Link copied to clipboard

A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.

Link copied to clipboard

Your okta authorization server id

Link copied to clipboard

The authorization_endpoint URL of your IdP

Link copied to clipboard

Your centrify account url

Link copied to clipboard

Your centrify app id

Link copied to clipboard

The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens

Link copied to clipboard

Custom claims

Link copied to clipboard

Your OAuth Client ID

Link copied to clipboard

Your OAuth Client Secret

Link copied to clipboard

Should Cloudflare try to load authentication contexts from your account

Link copied to clipboard

Your Azure directory uuid

Link copied to clipboard

The attribute name for email in the SAML response.

Link copied to clipboard

The claim name for email in the id_token response.

Link copied to clipboard

Add a list of attribute names that will be returned in the response header from the Access callback.

Link copied to clipboard

X509 certificate to verify the signature in the SAML authentication response

Link copied to clipboard

IdP Entity ID or Issuer URL

Link copied to clipboard

Your okta account url

Link copied to clipboard

Your OneLogin account url

Link copied to clipboard

Your PingOne environment identifier

Link copied to clipboard

Enable Proof Key for Code Exchange (PKCE)

Link copied to clipboard

Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interactionrequired error. prompt=selectaccount interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether. Available values: "login", "select_account", "none".

Link copied to clipboard

OAuth scopes

Link copied to clipboard

Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.

Link copied to clipboard

URL to send the SAML authentication requests to

Link copied to clipboard

Should Cloudflare try to load groups from your account

Link copied to clipboard

The token_endpoint URL of your IdP