Cloudflare v6.1.2 published on Monday, Apr 28, 2025 by Pulumi
cloudflare.getZeroTrustAccessIdentityProvider
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as cloudflare from "@pulumi/cloudflare";
const exampleZeroTrustAccessIdentityProvider = cloudflare.getZeroTrustAccessIdentityProvider({
identityProviderId: "f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
accountId: "account_id",
zoneId: "zone_id",
});
import pulumi
import pulumi_cloudflare as cloudflare
example_zero_trust_access_identity_provider = cloudflare.get_zero_trust_access_identity_provider(identity_provider_id="f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
account_id="account_id",
zone_id="zone_id")
package main
import (
"github.com/pulumi/pulumi-cloudflare/sdk/v6/go/cloudflare"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := cloudflare.LookupZeroTrustAccessIdentityProvider(ctx, &cloudflare.LookupZeroTrustAccessIdentityProviderArgs{
IdentityProviderId: pulumi.StringRef("f174e90a-fafe-4643-bbbc-4a0ed4fc8415"),
AccountId: pulumi.StringRef("account_id"),
ZoneId: pulumi.StringRef("zone_id"),
}, nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Cloudflare = Pulumi.Cloudflare;
return await Deployment.RunAsync(() =>
{
var exampleZeroTrustAccessIdentityProvider = Cloudflare.GetZeroTrustAccessIdentityProvider.Invoke(new()
{
IdentityProviderId = "f174e90a-fafe-4643-bbbc-4a0ed4fc8415",
AccountId = "account_id",
ZoneId = "zone_id",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.cloudflare.CloudflareFunctions;
import com.pulumi.cloudflare.inputs.GetZeroTrustAccessIdentityProviderArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var exampleZeroTrustAccessIdentityProvider = CloudflareFunctions.getZeroTrustAccessIdentityProvider(GetZeroTrustAccessIdentityProviderArgs.builder()
.identityProviderId("f174e90a-fafe-4643-bbbc-4a0ed4fc8415")
.accountId("account_id")
.zoneId("zone_id")
.build());
}
}
variables:
exampleZeroTrustAccessIdentityProvider:
fn::invoke:
function: cloudflare:getZeroTrustAccessIdentityProvider
arguments:
identityProviderId: f174e90a-fafe-4643-bbbc-4a0ed4fc8415
accountId: account_id
zoneId: zone_id
Using getZeroTrustAccessIdentityProvider
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getZeroTrustAccessIdentityProvider(args: GetZeroTrustAccessIdentityProviderArgs, opts?: InvokeOptions): Promise<GetZeroTrustAccessIdentityProviderResult>
function getZeroTrustAccessIdentityProviderOutput(args: GetZeroTrustAccessIdentityProviderOutputArgs, opts?: InvokeOptions): Output<GetZeroTrustAccessIdentityProviderResult>
def get_zero_trust_access_identity_provider(account_id: Optional[str] = None,
filter: Optional[GetZeroTrustAccessIdentityProviderFilter] = None,
identity_provider_id: Optional[str] = None,
zone_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetZeroTrustAccessIdentityProviderResult
def get_zero_trust_access_identity_provider_output(account_id: Optional[pulumi.Input[str]] = None,
filter: Optional[pulumi.Input[GetZeroTrustAccessIdentityProviderFilterArgs]] = None,
identity_provider_id: Optional[pulumi.Input[str]] = None,
zone_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetZeroTrustAccessIdentityProviderResult]
func LookupZeroTrustAccessIdentityProvider(ctx *Context, args *LookupZeroTrustAccessIdentityProviderArgs, opts ...InvokeOption) (*LookupZeroTrustAccessIdentityProviderResult, error)
func LookupZeroTrustAccessIdentityProviderOutput(ctx *Context, args *LookupZeroTrustAccessIdentityProviderOutputArgs, opts ...InvokeOption) LookupZeroTrustAccessIdentityProviderResultOutput
> Note: This function is named LookupZeroTrustAccessIdentityProvider
in the Go SDK.
public static class GetZeroTrustAccessIdentityProvider
{
public static Task<GetZeroTrustAccessIdentityProviderResult> InvokeAsync(GetZeroTrustAccessIdentityProviderArgs args, InvokeOptions? opts = null)
public static Output<GetZeroTrustAccessIdentityProviderResult> Invoke(GetZeroTrustAccessIdentityProviderInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetZeroTrustAccessIdentityProviderResult> getZeroTrustAccessIdentityProvider(GetZeroTrustAccessIdentityProviderArgs args, InvokeOptions options)
public static Output<GetZeroTrustAccessIdentityProviderResult> getZeroTrustAccessIdentityProvider(GetZeroTrustAccessIdentityProviderArgs args, InvokeOptions options)
fn::invoke:
function: cloudflare:index/getZeroTrustAccessIdentityProvider:getZeroTrustAccessIdentityProvider
arguments:
# arguments dictionary
The following arguments are supported:
- Account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- Filter
Get
Zero Trust Access Identity Provider Filter - Identity
Provider stringId - UUID.
- Zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- Account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- Filter
Get
Zero Trust Access Identity Provider Filter - Identity
Provider stringId - UUID.
- Zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account
Id String - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- filter
Get
Zero Trust Access Identity Provider Filter - identity
Provider StringId - UUID.
- zone
Id String - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- filter
Get
Zero Trust Access Identity Provider Filter - identity
Provider stringId - UUID.
- zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account_
id str - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- filter
Get
Zero Trust Access Identity Provider Filter - identity_
provider_ strid - UUID.
- zone_
id str - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account
Id String - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- filter Property Map
- identity
Provider StringId - UUID.
- zone
Id String - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
getZeroTrustAccessIdentityProvider Result
The following output properties are available:
- Config
Get
Zero Trust Access Identity Provider Config - The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.
- Id string
- UUID.
- Name string
- The name of the identity provider, shown to users on the login page.
- Scim
Config GetZero Trust Access Identity Provider Scim Config - The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.
- Type string
- The type of identity provider. To determine the value for a specific provider, refer to our developer documentation. Available values: "onetimepin", "azureAD", "saml", "centrify", "facebook", "github", "google-apps", "google", "linkedin", "oidc", "okta", "onelogin", "pingone", "yandex".
- Account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- Filter
Get
Zero Trust Access Identity Provider Filter - Identity
Provider stringId - UUID.
- Zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- Config
Get
Zero Trust Access Identity Provider Config - The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.
- Id string
- UUID.
- Name string
- The name of the identity provider, shown to users on the login page.
- Scim
Config GetZero Trust Access Identity Provider Scim Config - The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.
- Type string
- The type of identity provider. To determine the value for a specific provider, refer to our developer documentation. Available values: "onetimepin", "azureAD", "saml", "centrify", "facebook", "github", "google-apps", "google", "linkedin", "oidc", "okta", "onelogin", "pingone", "yandex".
- Account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- Filter
Get
Zero Trust Access Identity Provider Filter - Identity
Provider stringId - UUID.
- Zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- config
Get
Zero Trust Access Identity Provider Config - The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.
- id String
- UUID.
- name String
- The name of the identity provider, shown to users on the login page.
- scim
Config GetZero Trust Access Identity Provider Scim Config - The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.
- type String
- The type of identity provider. To determine the value for a specific provider, refer to our developer documentation. Available values: "onetimepin", "azureAD", "saml", "centrify", "facebook", "github", "google-apps", "google", "linkedin", "oidc", "okta", "onelogin", "pingone", "yandex".
- account
Id String - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- filter
Get
Zero Trust Access Identity Provider Filter - identity
Provider StringId - UUID.
- zone
Id String - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- config
Get
Zero Trust Access Identity Provider Config - The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.
- id string
- UUID.
- name string
- The name of the identity provider, shown to users on the login page.
- scim
Config GetZero Trust Access Identity Provider Scim Config - The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.
- type string
- The type of identity provider. To determine the value for a specific provider, refer to our developer documentation. Available values: "onetimepin", "azureAD", "saml", "centrify", "facebook", "github", "google-apps", "google", "linkedin", "oidc", "okta", "onelogin", "pingone", "yandex".
- account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- filter
Get
Zero Trust Access Identity Provider Filter - identity
Provider stringId - UUID.
- zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- config
Get
Zero Trust Access Identity Provider Config - The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.
- id str
- UUID.
- name str
- The name of the identity provider, shown to users on the login page.
- scim_
config GetZero Trust Access Identity Provider Scim Config - The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.
- type str
- The type of identity provider. To determine the value for a specific provider, refer to our developer documentation. Available values: "onetimepin", "azureAD", "saml", "centrify", "facebook", "github", "google-apps", "google", "linkedin", "oidc", "okta", "onelogin", "pingone", "yandex".
- account_
id str - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- filter
Get
Zero Trust Access Identity Provider Filter - identity_
provider_ strid - UUID.
- zone_
id str - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- config Property Map
- The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.
- id String
- UUID.
- name String
- The name of the identity provider, shown to users on the login page.
- scim
Config Property Map - The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.
- type String
- The type of identity provider. To determine the value for a specific provider, refer to our developer documentation. Available values: "onetimepin", "azureAD", "saml", "centrify", "facebook", "github", "google-apps", "google", "linkedin", "oidc", "okta", "onelogin", "pingone", "yandex".
- account
Id String - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- filter Property Map
- identity
Provider StringId - UUID.
- zone
Id String - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
Supporting Types
GetZeroTrustAccessIdentityProviderConfig
- Apps
Domain string - Your companies TLD
- Attributes List<string>
- A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.
- Auth
Url string - The authorization_endpoint URL of your IdP
- string
- Your okta authorization server id
- Centrify
Account string - Your centrify account url
- Centrify
App stringId - Your centrify app id
- Certs
Url string - The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens
- Claims List<string>
- Custom claims
- Client
Id string - Your OAuth Client ID
- Client
Secret string - Your OAuth Client Secret
- Conditional
Access boolEnabled - Should Cloudflare try to load authentication contexts from your account
- Directory
Id string - Your Azure directory uuid
- Email
Attribute stringName - The attribute name for email in the SAML response.
- Email
Claim stringName - The claim name for email in the id_token response.
- Header
Attributes List<GetZero Trust Access Identity Provider Config Header Attribute> - Add a list of attribute names that will be returned in the response header from the Access callback.
- Idp
Public List<string>Certs - X509 certificate to verify the signature in the SAML authentication response
- Issuer
Url string - IdP Entity ID or Issuer URL
- Okta
Account string - Your okta account url
- Onelogin
Account string - Your OneLogin account url
- Ping
Env stringId - Your PingOne environment identifier
- Pkce
Enabled bool - Enable Proof Key for Code Exchange (PKCE)
- Prompt string
- Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interactionrequired error. prompt=selectaccount interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether. Available values: "login", "select_account", "none".
- Redirect
Url string - Scopes List<string>
- OAuth scopes
- Sign
Request bool - Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.
- Sso
Target stringUrl - URL to send the SAML authentication requests to
- Support
Groups bool - Should Cloudflare try to load groups from your account
- Token
Url string - The token_endpoint URL of your IdP
- Apps
Domain string - Your companies TLD
- Attributes []string
- A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.
- Auth
Url string - The authorization_endpoint URL of your IdP
- string
- Your okta authorization server id
- Centrify
Account string - Your centrify account url
- Centrify
App stringId - Your centrify app id
- Certs
Url string - The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens
- Claims []string
- Custom claims
- Client
Id string - Your OAuth Client ID
- Client
Secret string - Your OAuth Client Secret
- Conditional
Access boolEnabled - Should Cloudflare try to load authentication contexts from your account
- Directory
Id string - Your Azure directory uuid
- Email
Attribute stringName - The attribute name for email in the SAML response.
- Email
Claim stringName - The claim name for email in the id_token response.
- Header
Attributes []GetZero Trust Access Identity Provider Config Header Attribute - Add a list of attribute names that will be returned in the response header from the Access callback.
- Idp
Public []stringCerts - X509 certificate to verify the signature in the SAML authentication response
- Issuer
Url string - IdP Entity ID or Issuer URL
- Okta
Account string - Your okta account url
- Onelogin
Account string - Your OneLogin account url
- Ping
Env stringId - Your PingOne environment identifier
- Pkce
Enabled bool - Enable Proof Key for Code Exchange (PKCE)
- Prompt string
- Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interactionrequired error. prompt=selectaccount interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether. Available values: "login", "select_account", "none".
- Redirect
Url string - Scopes []string
- OAuth scopes
- Sign
Request bool - Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.
- Sso
Target stringUrl - URL to send the SAML authentication requests to
- Support
Groups bool - Should Cloudflare try to load groups from your account
- Token
Url string - The token_endpoint URL of your IdP
- apps
Domain String - Your companies TLD
- attributes List<String>
- A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.
- auth
Url String - The authorization_endpoint URL of your IdP
- String
- Your okta authorization server id
- centrify
Account String - Your centrify account url
- centrify
App StringId - Your centrify app id
- certs
Url String - The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens
- claims List<String>
- Custom claims
- client
Id String - Your OAuth Client ID
- client
Secret String - Your OAuth Client Secret
- conditional
Access BooleanEnabled - Should Cloudflare try to load authentication contexts from your account
- directory
Id String - Your Azure directory uuid
- email
Attribute StringName - The attribute name for email in the SAML response.
- email
Claim StringName - The claim name for email in the id_token response.
- header
Attributes List<GetZero Trust Access Identity Provider Config Header Attribute> - Add a list of attribute names that will be returned in the response header from the Access callback.
- idp
Public List<String>Certs - X509 certificate to verify the signature in the SAML authentication response
- issuer
Url String - IdP Entity ID or Issuer URL
- okta
Account String - Your okta account url
- onelogin
Account String - Your OneLogin account url
- ping
Env StringId - Your PingOne environment identifier
- pkce
Enabled Boolean - Enable Proof Key for Code Exchange (PKCE)
- prompt String
- Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interactionrequired error. prompt=selectaccount interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether. Available values: "login", "select_account", "none".
- redirect
Url String - scopes List<String>
- OAuth scopes
- sign
Request Boolean - Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.
- sso
Target StringUrl - URL to send the SAML authentication requests to
- support
Groups Boolean - Should Cloudflare try to load groups from your account
- token
Url String - The token_endpoint URL of your IdP
- apps
Domain string - Your companies TLD
- attributes string[]
- A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.
- auth
Url string - The authorization_endpoint URL of your IdP
- string
- Your okta authorization server id
- centrify
Account string - Your centrify account url
- centrify
App stringId - Your centrify app id
- certs
Url string - The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens
- claims string[]
- Custom claims
- client
Id string - Your OAuth Client ID
- client
Secret string - Your OAuth Client Secret
- conditional
Access booleanEnabled - Should Cloudflare try to load authentication contexts from your account
- directory
Id string - Your Azure directory uuid
- email
Attribute stringName - The attribute name for email in the SAML response.
- email
Claim stringName - The claim name for email in the id_token response.
- header
Attributes GetZero Trust Access Identity Provider Config Header Attribute[] - Add a list of attribute names that will be returned in the response header from the Access callback.
- idp
Public string[]Certs - X509 certificate to verify the signature in the SAML authentication response
- issuer
Url string - IdP Entity ID or Issuer URL
- okta
Account string - Your okta account url
- onelogin
Account string - Your OneLogin account url
- ping
Env stringId - Your PingOne environment identifier
- pkce
Enabled boolean - Enable Proof Key for Code Exchange (PKCE)
- prompt string
- Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interactionrequired error. prompt=selectaccount interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether. Available values: "login", "select_account", "none".
- redirect
Url string - scopes string[]
- OAuth scopes
- sign
Request boolean - Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.
- sso
Target stringUrl - URL to send the SAML authentication requests to
- support
Groups boolean - Should Cloudflare try to load groups from your account
- token
Url string - The token_endpoint URL of your IdP
- apps_
domain str - Your companies TLD
- attributes Sequence[str]
- A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.
- auth_
url str - The authorization_endpoint URL of your IdP
- str
- Your okta authorization server id
- centrify_
account str - Your centrify account url
- centrify_
app_ strid - Your centrify app id
- certs_
url str - The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens
- claims Sequence[str]
- Custom claims
- client_
id str - Your OAuth Client ID
- client_
secret str - Your OAuth Client Secret
- conditional_
access_ boolenabled - Should Cloudflare try to load authentication contexts from your account
- directory_
id str - Your Azure directory uuid
- email_
attribute_ strname - The attribute name for email in the SAML response.
- email_
claim_ strname - The claim name for email in the id_token response.
- header_
attributes Sequence[GetZero Trust Access Identity Provider Config Header Attribute] - Add a list of attribute names that will be returned in the response header from the Access callback.
- idp_
public_ Sequence[str]certs - X509 certificate to verify the signature in the SAML authentication response
- issuer_
url str - IdP Entity ID or Issuer URL
- okta_
account str - Your okta account url
- onelogin_
account str - Your OneLogin account url
- ping_
env_ strid - Your PingOne environment identifier
- pkce_
enabled bool - Enable Proof Key for Code Exchange (PKCE)
- prompt str
- Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interactionrequired error. prompt=selectaccount interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether. Available values: "login", "select_account", "none".
- redirect_
url str - scopes Sequence[str]
- OAuth scopes
- sign_
request bool - Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.
- sso_
target_ strurl - URL to send the SAML authentication requests to
- support_
groups bool - Should Cloudflare try to load groups from your account
- token_
url str - The token_endpoint URL of your IdP
- apps
Domain String - Your companies TLD
- attributes List<String>
- A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.
- auth
Url String - The authorization_endpoint URL of your IdP
- String
- Your okta authorization server id
- centrify
Account String - Your centrify account url
- centrify
App StringId - Your centrify app id
- certs
Url String - The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens
- claims List<String>
- Custom claims
- client
Id String - Your OAuth Client ID
- client
Secret String - Your OAuth Client Secret
- conditional
Access BooleanEnabled - Should Cloudflare try to load authentication contexts from your account
- directory
Id String - Your Azure directory uuid
- email
Attribute StringName - The attribute name for email in the SAML response.
- email
Claim StringName - The claim name for email in the id_token response.
- header
Attributes List<Property Map> - Add a list of attribute names that will be returned in the response header from the Access callback.
- idp
Public List<String>Certs - X509 certificate to verify the signature in the SAML authentication response
- issuer
Url String - IdP Entity ID or Issuer URL
- okta
Account String - Your okta account url
- onelogin
Account String - Your OneLogin account url
- ping
Env StringId - Your PingOne environment identifier
- pkce
Enabled Boolean - Enable Proof Key for Code Exchange (PKCE)
- prompt String
- Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interactionrequired error. prompt=selectaccount interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether. Available values: "login", "select_account", "none".
- redirect
Url String - scopes List<String>
- OAuth scopes
- sign
Request Boolean - Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.
- sso
Target StringUrl - URL to send the SAML authentication requests to
- support
Groups Boolean - Should Cloudflare try to load groups from your account
- token
Url String - The token_endpoint URL of your IdP
GetZeroTrustAccessIdentityProviderConfigHeaderAttribute
- Attribute
Name string - attribute name from the IDP
- Header
Name string - header that will be added on the request to the origin
- Attribute
Name string - attribute name from the IDP
- Header
Name string - header that will be added on the request to the origin
- attribute
Name String - attribute name from the IDP
- header
Name String - header that will be added on the request to the origin
- attribute
Name string - attribute name from the IDP
- header
Name string - header that will be added on the request to the origin
- attribute_
name str - attribute name from the IDP
- header_
name str - header that will be added on the request to the origin
- attribute
Name String - attribute name from the IDP
- header
Name String - header that will be added on the request to the origin
GetZeroTrustAccessIdentityProviderFilter
- Scim
Enabled string - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- Scim
Enabled string - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- scim
Enabled String - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- scim
Enabled string - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- scim_
enabled str - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- scim
Enabled String - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
GetZeroTrustAccessIdentityProviderScimConfig
- Enabled bool
- A flag to enable or disable SCIM for the identity provider.
- Identity
Update stringBehavior - Indicates how a SCIM event updates a user identity used for policy evaluation. Use "automatic" to automatically update a user's identity and augment it with fields from the SCIM user resource. Use "reauth" to force re-authentication on group membership updates, user identity update will only occur after successful re-authentication. With "reauth" identities will not contain fields from the SCIM user resource. With "noaction" identities will not be changed by SCIM updates in any way and users will not be prompted to reauthenticate. Available values: "automatic", "reauth", "noaction".
- Scim
Base stringUrl - The base URL of Cloudflare's SCIM V2.0 API endpoint.
- Seat
Deprovision bool - A flag to remove a user's seat in Zero Trust when they have been deprovisioned in the Identity Provider. This cannot be enabled unless user_deprovision is also enabled.
- Secret string
- A read-only token generated when the SCIM integration is enabled for the first time. It is redacted on subsequent requests. If you lose this you will need to refresh it at /access/identityproviders/:idpID/refreshscim_secret.
- User
Deprovision bool - A flag to enable revoking a user's session in Access and Gateway when they have been deprovisioned in the Identity Provider.
- Enabled bool
- A flag to enable or disable SCIM for the identity provider.
- Identity
Update stringBehavior - Indicates how a SCIM event updates a user identity used for policy evaluation. Use "automatic" to automatically update a user's identity and augment it with fields from the SCIM user resource. Use "reauth" to force re-authentication on group membership updates, user identity update will only occur after successful re-authentication. With "reauth" identities will not contain fields from the SCIM user resource. With "noaction" identities will not be changed by SCIM updates in any way and users will not be prompted to reauthenticate. Available values: "automatic", "reauth", "noaction".
- Scim
Base stringUrl - The base URL of Cloudflare's SCIM V2.0 API endpoint.
- Seat
Deprovision bool - A flag to remove a user's seat in Zero Trust when they have been deprovisioned in the Identity Provider. This cannot be enabled unless user_deprovision is also enabled.
- Secret string
- A read-only token generated when the SCIM integration is enabled for the first time. It is redacted on subsequent requests. If you lose this you will need to refresh it at /access/identityproviders/:idpID/refreshscim_secret.
- User
Deprovision bool - A flag to enable revoking a user's session in Access and Gateway when they have been deprovisioned in the Identity Provider.
- enabled Boolean
- A flag to enable or disable SCIM for the identity provider.
- identity
Update StringBehavior - Indicates how a SCIM event updates a user identity used for policy evaluation. Use "automatic" to automatically update a user's identity and augment it with fields from the SCIM user resource. Use "reauth" to force re-authentication on group membership updates, user identity update will only occur after successful re-authentication. With "reauth" identities will not contain fields from the SCIM user resource. With "noaction" identities will not be changed by SCIM updates in any way and users will not be prompted to reauthenticate. Available values: "automatic", "reauth", "noaction".
- scim
Base StringUrl - The base URL of Cloudflare's SCIM V2.0 API endpoint.
- seat
Deprovision Boolean - A flag to remove a user's seat in Zero Trust when they have been deprovisioned in the Identity Provider. This cannot be enabled unless user_deprovision is also enabled.
- secret String
- A read-only token generated when the SCIM integration is enabled for the first time. It is redacted on subsequent requests. If you lose this you will need to refresh it at /access/identityproviders/:idpID/refreshscim_secret.
- user
Deprovision Boolean - A flag to enable revoking a user's session in Access and Gateway when they have been deprovisioned in the Identity Provider.
- enabled boolean
- A flag to enable or disable SCIM for the identity provider.
- identity
Update stringBehavior - Indicates how a SCIM event updates a user identity used for policy evaluation. Use "automatic" to automatically update a user's identity and augment it with fields from the SCIM user resource. Use "reauth" to force re-authentication on group membership updates, user identity update will only occur after successful re-authentication. With "reauth" identities will not contain fields from the SCIM user resource. With "noaction" identities will not be changed by SCIM updates in any way and users will not be prompted to reauthenticate. Available values: "automatic", "reauth", "noaction".
- scim
Base stringUrl - The base URL of Cloudflare's SCIM V2.0 API endpoint.
- seat
Deprovision boolean - A flag to remove a user's seat in Zero Trust when they have been deprovisioned in the Identity Provider. This cannot be enabled unless user_deprovision is also enabled.
- secret string
- A read-only token generated when the SCIM integration is enabled for the first time. It is redacted on subsequent requests. If you lose this you will need to refresh it at /access/identityproviders/:idpID/refreshscim_secret.
- user
Deprovision boolean - A flag to enable revoking a user's session in Access and Gateway when they have been deprovisioned in the Identity Provider.
- enabled bool
- A flag to enable or disable SCIM for the identity provider.
- identity_
update_ strbehavior - Indicates how a SCIM event updates a user identity used for policy evaluation. Use "automatic" to automatically update a user's identity and augment it with fields from the SCIM user resource. Use "reauth" to force re-authentication on group membership updates, user identity update will only occur after successful re-authentication. With "reauth" identities will not contain fields from the SCIM user resource. With "noaction" identities will not be changed by SCIM updates in any way and users will not be prompted to reauthenticate. Available values: "automatic", "reauth", "noaction".
- scim_
base_ strurl - The base URL of Cloudflare's SCIM V2.0 API endpoint.
- seat_
deprovision bool - A flag to remove a user's seat in Zero Trust when they have been deprovisioned in the Identity Provider. This cannot be enabled unless user_deprovision is also enabled.
- secret str
- A read-only token generated when the SCIM integration is enabled for the first time. It is redacted on subsequent requests. If you lose this you will need to refresh it at /access/identityproviders/:idpID/refreshscim_secret.
- user_
deprovision bool - A flag to enable revoking a user's session in Access and Gateway when they have been deprovisioned in the Identity Provider.
- enabled Boolean
- A flag to enable or disable SCIM for the identity provider.
- identity
Update StringBehavior - Indicates how a SCIM event updates a user identity used for policy evaluation. Use "automatic" to automatically update a user's identity and augment it with fields from the SCIM user resource. Use "reauth" to force re-authentication on group membership updates, user identity update will only occur after successful re-authentication. With "reauth" identities will not contain fields from the SCIM user resource. With "noaction" identities will not be changed by SCIM updates in any way and users will not be prompted to reauthenticate. Available values: "automatic", "reauth", "noaction".
- scim
Base StringUrl - The base URL of Cloudflare's SCIM V2.0 API endpoint.
- seat
Deprovision Boolean - A flag to remove a user's seat in Zero Trust when they have been deprovisioned in the Identity Provider. This cannot be enabled unless user_deprovision is also enabled.
- secret String
- A read-only token generated when the SCIM integration is enabled for the first time. It is redacted on subsequent requests. If you lose this you will need to refresh it at /access/identityproviders/:idpID/refreshscim_secret.
- user
Deprovision Boolean - A flag to enable revoking a user's session in Access and Gateway when they have been deprovisioned in the Identity Provider.
Package Details
- Repository
- Cloudflare pulumi/pulumi-cloudflare
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
cloudflare
Terraform Provider.