Inbound Saml Config Args
Inbound SAML configuration for a Identity Toolkit project. You must enable the Google Identity Platform in the marketplace prior to using this resource.
Example Usage
Identity Platform Inbound Saml Config Basic
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.identityplatform.InboundSamlConfig;
import com.pulumi.gcp.identityplatform.InboundSamlConfigArgs;
import com.pulumi.gcp.identityplatform.inputs.InboundSamlConfigIdpConfigArgs;
import com.pulumi.gcp.identityplatform.inputs.InboundSamlConfigSpConfigArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var samlConfig = new InboundSamlConfig("samlConfig", InboundSamlConfigArgs.builder()
.displayName("Display Name")
.idpConfig(InboundSamlConfigIdpConfigArgs.builder()
.idpEntityId("tf-idp")
.signRequest(true)
.ssoUrl("https://example.com")
.idpCertificates(InboundSamlConfigIdpConfigIdpCertificateArgs.builder()
.x509Certificate(Files.readString(Paths.get("test-fixtures/rsa_cert.pem")))
.build())
.build())
.spConfig(InboundSamlConfigSpConfigArgs.builder()
.spEntityId("tf-sp")
.callbackUri("https://example.com")
.build())
.build());
}
}
Import
InboundSamlConfig can be imported using any of these accepted formats
$ pulumi import gcp:identityplatform/inboundSamlConfig:InboundSamlConfig default projects/{{project}}/inboundSamlConfigs/{{name}}
$ pulumi import gcp:identityplatform/inboundSamlConfig:InboundSamlConfig default {{project}}/{{name}}
$ pulumi import gcp:identityplatform/inboundSamlConfig:InboundSamlConfig default {{name}}
Constructors
Properties
Human friendly display name.
SAML IdP configuration when the project acts as the relying party Structure is documented below.
The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.