Cloudflare v6.1.2 published on Monday, Apr 28, 2025 by Pulumi
cloudflare.getZeroTrustAccessIdentityProviders
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as cloudflare from "@pulumi/cloudflare";
const exampleZeroTrustAccessIdentityProviders = cloudflare.getZeroTrustAccessIdentityProviders({
accountId: "account_id",
zoneId: "zone_id",
scimEnabled: "scim_enabled",
});
import pulumi
import pulumi_cloudflare as cloudflare
example_zero_trust_access_identity_providers = cloudflare.get_zero_trust_access_identity_providers(account_id="account_id",
zone_id="zone_id",
scim_enabled="scim_enabled")
package main
import (
"github.com/pulumi/pulumi-cloudflare/sdk/v6/go/cloudflare"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := cloudflare.LookupZeroTrustAccessIdentityProviders(ctx, &cloudflare.LookupZeroTrustAccessIdentityProvidersArgs{
AccountId: pulumi.StringRef("account_id"),
ZoneId: pulumi.StringRef("zone_id"),
ScimEnabled: pulumi.StringRef("scim_enabled"),
}, nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Cloudflare = Pulumi.Cloudflare;
return await Deployment.RunAsync(() =>
{
var exampleZeroTrustAccessIdentityProviders = Cloudflare.GetZeroTrustAccessIdentityProviders.Invoke(new()
{
AccountId = "account_id",
ZoneId = "zone_id",
ScimEnabled = "scim_enabled",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.cloudflare.CloudflareFunctions;
import com.pulumi.cloudflare.inputs.GetZeroTrustAccessIdentityProvidersArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var exampleZeroTrustAccessIdentityProviders = CloudflareFunctions.getZeroTrustAccessIdentityProviders(GetZeroTrustAccessIdentityProvidersArgs.builder()
.accountId("account_id")
.zoneId("zone_id")
.scimEnabled("scim_enabled")
.build());
}
}
variables:
exampleZeroTrustAccessIdentityProviders:
fn::invoke:
function: cloudflare:getZeroTrustAccessIdentityProviders
arguments:
accountId: account_id
zoneId: zone_id
scimEnabled: scim_enabled
Using getZeroTrustAccessIdentityProviders
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getZeroTrustAccessIdentityProviders(args: GetZeroTrustAccessIdentityProvidersArgs, opts?: InvokeOptions): Promise<GetZeroTrustAccessIdentityProvidersResult>
function getZeroTrustAccessIdentityProvidersOutput(args: GetZeroTrustAccessIdentityProvidersOutputArgs, opts?: InvokeOptions): Output<GetZeroTrustAccessIdentityProvidersResult>
def get_zero_trust_access_identity_providers(account_id: Optional[str] = None,
max_items: Optional[int] = None,
scim_enabled: Optional[str] = None,
zone_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetZeroTrustAccessIdentityProvidersResult
def get_zero_trust_access_identity_providers_output(account_id: Optional[pulumi.Input[str]] = None,
max_items: Optional[pulumi.Input[int]] = None,
scim_enabled: Optional[pulumi.Input[str]] = None,
zone_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetZeroTrustAccessIdentityProvidersResult]
func LookupZeroTrustAccessIdentityProviders(ctx *Context, args *LookupZeroTrustAccessIdentityProvidersArgs, opts ...InvokeOption) (*LookupZeroTrustAccessIdentityProvidersResult, error)
func LookupZeroTrustAccessIdentityProvidersOutput(ctx *Context, args *LookupZeroTrustAccessIdentityProvidersOutputArgs, opts ...InvokeOption) LookupZeroTrustAccessIdentityProvidersResultOutput
> Note: This function is named LookupZeroTrustAccessIdentityProviders
in the Go SDK.
public static class GetZeroTrustAccessIdentityProviders
{
public static Task<GetZeroTrustAccessIdentityProvidersResult> InvokeAsync(GetZeroTrustAccessIdentityProvidersArgs args, InvokeOptions? opts = null)
public static Output<GetZeroTrustAccessIdentityProvidersResult> Invoke(GetZeroTrustAccessIdentityProvidersInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetZeroTrustAccessIdentityProvidersResult> getZeroTrustAccessIdentityProviders(GetZeroTrustAccessIdentityProvidersArgs args, InvokeOptions options)
public static Output<GetZeroTrustAccessIdentityProvidersResult> getZeroTrustAccessIdentityProviders(GetZeroTrustAccessIdentityProvidersArgs args, InvokeOptions options)
fn::invoke:
function: cloudflare:index/getZeroTrustAccessIdentityProviders:getZeroTrustAccessIdentityProviders
arguments:
# arguments dictionary
The following arguments are supported:
- Account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- Max
Items int - Max items to fetch, default: 1000
- Scim
Enabled string - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- Zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- Account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- Max
Items int - Max items to fetch, default: 1000
- Scim
Enabled string - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- Zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account
Id String - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- max
Items Integer - Max items to fetch, default: 1000
- scim
Enabled String - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- zone
Id String - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- max
Items number - Max items to fetch, default: 1000
- scim
Enabled string - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account_
id str - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- max_
items int - Max items to fetch, default: 1000
- scim_
enabled str - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- zone_
id str - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- account
Id String - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- max
Items Number - Max items to fetch, default: 1000
- scim
Enabled String - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- zone
Id String - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
getZeroTrustAccessIdentityProviders Result
The following output properties are available:
- Id string
- The provider-assigned unique ID for this managed resource.
- Results
List<Get
Zero Trust Access Identity Providers Result> - The items returned by the data source
- Account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- Max
Items int - Max items to fetch, default: 1000
- Scim
Enabled string - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- Zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- Id string
- The provider-assigned unique ID for this managed resource.
- Results
[]Get
Zero Trust Access Identity Providers Result - The items returned by the data source
- Account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- Max
Items int - Max items to fetch, default: 1000
- Scim
Enabled string - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- Zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- id String
- The provider-assigned unique ID for this managed resource.
- results
List<Get
Zero Trust Access Identity Providers Result> - The items returned by the data source
- account
Id String - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- max
Items Integer - Max items to fetch, default: 1000
- scim
Enabled String - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- zone
Id String - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- id string
- The provider-assigned unique ID for this managed resource.
- results
Get
Zero Trust Access Identity Providers Result[] - The items returned by the data source
- account
Id string - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- max
Items number - Max items to fetch, default: 1000
- scim
Enabled string - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- zone
Id string - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- id str
- The provider-assigned unique ID for this managed resource.
- results
Sequence[Get
Zero Trust Access Identity Providers Result] - The items returned by the data source
- account_
id str - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- max_
items int - Max items to fetch, default: 1000
- scim_
enabled str - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- zone_
id str - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
- id String
- The provider-assigned unique ID for this managed resource.
- results List<Property Map>
- The items returned by the data source
- account
Id String - The Account ID to use for this endpoint. Mutually exclusive with the Zone ID.
- max
Items Number - Max items to fetch, default: 1000
- scim
Enabled String - Indicates to Access to only retrieve identity providers that have the System for Cross-Domain Identity Management (SCIM) enabled.
- zone
Id String - The Zone ID to use for this endpoint. Mutually exclusive with the Account ID.
Supporting Types
GetZeroTrustAccessIdentityProvidersResult
- Config
Get
Zero Trust Access Identity Providers Result Config - The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.
- Id string
- UUID.
- Name string
- The name of the identity provider, shown to users on the login page.
- Scim
Config GetZero Trust Access Identity Providers Result Scim Config - The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.
- Type string
- The type of identity provider. To determine the value for a specific provider, refer to our developer documentation. Available values: "onetimepin", "azureAD", "saml", "centrify", "facebook", "github", "google-apps", "google", "linkedin", "oidc", "okta", "onelogin", "pingone", "yandex".
- Config
Get
Zero Trust Access Identity Providers Result Config - The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.
- Id string
- UUID.
- Name string
- The name of the identity provider, shown to users on the login page.
- Scim
Config GetZero Trust Access Identity Providers Result Scim Config - The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.
- Type string
- The type of identity provider. To determine the value for a specific provider, refer to our developer documentation. Available values: "onetimepin", "azureAD", "saml", "centrify", "facebook", "github", "google-apps", "google", "linkedin", "oidc", "okta", "onelogin", "pingone", "yandex".
- config
Get
Zero Trust Access Identity Providers Result Config - The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.
- id String
- UUID.
- name String
- The name of the identity provider, shown to users on the login page.
- scim
Config GetZero Trust Access Identity Providers Result Scim Config - The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.
- type String
- The type of identity provider. To determine the value for a specific provider, refer to our developer documentation. Available values: "onetimepin", "azureAD", "saml", "centrify", "facebook", "github", "google-apps", "google", "linkedin", "oidc", "okta", "onelogin", "pingone", "yandex".
- config
Get
Zero Trust Access Identity Providers Result Config - The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.
- id string
- UUID.
- name string
- The name of the identity provider, shown to users on the login page.
- scim
Config GetZero Trust Access Identity Providers Result Scim Config - The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.
- type string
- The type of identity provider. To determine the value for a specific provider, refer to our developer documentation. Available values: "onetimepin", "azureAD", "saml", "centrify", "facebook", "github", "google-apps", "google", "linkedin", "oidc", "okta", "onelogin", "pingone", "yandex".
- config
Get
Zero Trust Access Identity Providers Result Config - The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.
- id str
- UUID.
- name str
- The name of the identity provider, shown to users on the login page.
- scim_
config GetZero Trust Access Identity Providers Result Scim Config - The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.
- type str
- The type of identity provider. To determine the value for a specific provider, refer to our developer documentation. Available values: "onetimepin", "azureAD", "saml", "centrify", "facebook", "github", "google-apps", "google", "linkedin", "oidc", "okta", "onelogin", "pingone", "yandex".
- config Property Map
- The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.
- id String
- UUID.
- name String
- The name of the identity provider, shown to users on the login page.
- scim
Config Property Map - The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.
- type String
- The type of identity provider. To determine the value for a specific provider, refer to our developer documentation. Available values: "onetimepin", "azureAD", "saml", "centrify", "facebook", "github", "google-apps", "google", "linkedin", "oidc", "okta", "onelogin", "pingone", "yandex".
GetZeroTrustAccessIdentityProvidersResultConfig
- Apps
Domain string - Your companies TLD
- Attributes List<string>
- A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.
- Auth
Url string - The authorization_endpoint URL of your IdP
- string
- Your okta authorization server id
- Centrify
Account string - Your centrify account url
- Centrify
App stringId - Your centrify app id
- Certs
Url string - The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens
- Claims List<string>
- Custom claims
- Client
Id string - Your OAuth Client ID
- Client
Secret string - Your OAuth Client Secret
- Conditional
Access boolEnabled - Should Cloudflare try to load authentication contexts from your account
- Directory
Id string - Your Azure directory uuid
- Email
Attribute stringName - The attribute name for email in the SAML response.
- Email
Claim stringName - The claim name for email in the id_token response.
- Header
Attributes List<GetZero Trust Access Identity Providers Result Config Header Attribute> - Add a list of attribute names that will be returned in the response header from the Access callback.
- Idp
Public List<string>Certs - X509 certificate to verify the signature in the SAML authentication response
- Issuer
Url string - IdP Entity ID or Issuer URL
- Okta
Account string - Your okta account url
- Onelogin
Account string - Your OneLogin account url
- Ping
Env stringId - Your PingOne environment identifier
- Pkce
Enabled bool - Enable Proof Key for Code Exchange (PKCE)
- Prompt string
- Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interactionrequired error. prompt=selectaccount interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether. Available values: "login", "select_account", "none".
- Scopes List<string>
- OAuth scopes
- Sign
Request bool - Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.
- Sso
Target stringUrl - URL to send the SAML authentication requests to
- Support
Groups bool - Should Cloudflare try to load groups from your account
- Token
Url string - The token_endpoint URL of your IdP
- Apps
Domain string - Your companies TLD
- Attributes []string
- A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.
- Auth
Url string - The authorization_endpoint URL of your IdP
- string
- Your okta authorization server id
- Centrify
Account string - Your centrify account url
- Centrify
App stringId - Your centrify app id
- Certs
Url string - The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens
- Claims []string
- Custom claims
- Client
Id string - Your OAuth Client ID
- Client
Secret string - Your OAuth Client Secret
- Conditional
Access boolEnabled - Should Cloudflare try to load authentication contexts from your account
- Directory
Id string - Your Azure directory uuid
- Email
Attribute stringName - The attribute name for email in the SAML response.
- Email
Claim stringName - The claim name for email in the id_token response.
- Header
Attributes []GetZero Trust Access Identity Providers Result Config Header Attribute - Add a list of attribute names that will be returned in the response header from the Access callback.
- Idp
Public []stringCerts - X509 certificate to verify the signature in the SAML authentication response
- Issuer
Url string - IdP Entity ID or Issuer URL
- Okta
Account string - Your okta account url
- Onelogin
Account string - Your OneLogin account url
- Ping
Env stringId - Your PingOne environment identifier
- Pkce
Enabled bool - Enable Proof Key for Code Exchange (PKCE)
- Prompt string
- Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interactionrequired error. prompt=selectaccount interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether. Available values: "login", "select_account", "none".
- Scopes []string
- OAuth scopes
- Sign
Request bool - Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.
- Sso
Target stringUrl - URL to send the SAML authentication requests to
- Support
Groups bool - Should Cloudflare try to load groups from your account
- Token
Url string - The token_endpoint URL of your IdP
- apps
Domain String - Your companies TLD
- attributes List<String>
- A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.
- auth
Url String - The authorization_endpoint URL of your IdP
- String
- Your okta authorization server id
- centrify
Account String - Your centrify account url
- centrify
App StringId - Your centrify app id
- certs
Url String - The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens
- claims List<String>
- Custom claims
- client
Id String - Your OAuth Client ID
- client
Secret String - Your OAuth Client Secret
- conditional
Access BooleanEnabled - Should Cloudflare try to load authentication contexts from your account
- directory
Id String - Your Azure directory uuid
- email
Attribute StringName - The attribute name for email in the SAML response.
- email
Claim StringName - The claim name for email in the id_token response.
- header
Attributes List<GetZero Trust Access Identity Providers Result Config Header Attribute> - Add a list of attribute names that will be returned in the response header from the Access callback.
- idp
Public List<String>Certs - X509 certificate to verify the signature in the SAML authentication response
- issuer
Url String - IdP Entity ID or Issuer URL
- okta
Account String - Your okta account url
- onelogin
Account String - Your OneLogin account url
- ping
Env StringId - Your PingOne environment identifier
- pkce
Enabled Boolean - Enable Proof Key for Code Exchange (PKCE)
- prompt String
- Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interactionrequired error. prompt=selectaccount interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether. Available values: "login", "select_account", "none".
- scopes List<String>
- OAuth scopes
- sign
Request Boolean - Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.
- sso
Target StringUrl - URL to send the SAML authentication requests to
- support
Groups Boolean - Should Cloudflare try to load groups from your account
- token
Url String - The token_endpoint URL of your IdP
- apps
Domain string - Your companies TLD
- attributes string[]
- A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.
- auth
Url string - The authorization_endpoint URL of your IdP
- string
- Your okta authorization server id
- centrify
Account string - Your centrify account url
- centrify
App stringId - Your centrify app id
- certs
Url string - The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens
- claims string[]
- Custom claims
- client
Id string - Your OAuth Client ID
- client
Secret string - Your OAuth Client Secret
- conditional
Access booleanEnabled - Should Cloudflare try to load authentication contexts from your account
- directory
Id string - Your Azure directory uuid
- email
Attribute stringName - The attribute name for email in the SAML response.
- email
Claim stringName - The claim name for email in the id_token response.
- header
Attributes GetZero Trust Access Identity Providers Result Config Header Attribute[] - Add a list of attribute names that will be returned in the response header from the Access callback.
- idp
Public string[]Certs - X509 certificate to verify the signature in the SAML authentication response
- issuer
Url string - IdP Entity ID or Issuer URL
- okta
Account string - Your okta account url
- onelogin
Account string - Your OneLogin account url
- ping
Env stringId - Your PingOne environment identifier
- pkce
Enabled boolean - Enable Proof Key for Code Exchange (PKCE)
- prompt string
- Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interactionrequired error. prompt=selectaccount interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether. Available values: "login", "select_account", "none".
- scopes string[]
- OAuth scopes
- sign
Request boolean - Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.
- sso
Target stringUrl - URL to send the SAML authentication requests to
- support
Groups boolean - Should Cloudflare try to load groups from your account
- token
Url string - The token_endpoint URL of your IdP
- apps_
domain str - Your companies TLD
- attributes Sequence[str]
- A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.
- auth_
url str - The authorization_endpoint URL of your IdP
- str
- Your okta authorization server id
- centrify_
account str - Your centrify account url
- centrify_
app_ strid - Your centrify app id
- certs_
url str - The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens
- claims Sequence[str]
- Custom claims
- client_
id str - Your OAuth Client ID
- client_
secret str - Your OAuth Client Secret
- conditional_
access_ boolenabled - Should Cloudflare try to load authentication contexts from your account
- directory_
id str - Your Azure directory uuid
- email_
attribute_ strname - The attribute name for email in the SAML response.
- email_
claim_ strname - The claim name for email in the id_token response.
- header_
attributes Sequence[GetZero Trust Access Identity Providers Result Config Header Attribute] - Add a list of attribute names that will be returned in the response header from the Access callback.
- idp_
public_ Sequence[str]certs - X509 certificate to verify the signature in the SAML authentication response
- issuer_
url str - IdP Entity ID or Issuer URL
- okta_
account str - Your okta account url
- onelogin_
account str - Your OneLogin account url
- ping_
env_ strid - Your PingOne environment identifier
- pkce_
enabled bool - Enable Proof Key for Code Exchange (PKCE)
- prompt str
- Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interactionrequired error. prompt=selectaccount interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether. Available values: "login", "select_account", "none".
- scopes Sequence[str]
- OAuth scopes
- sign_
request bool - Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.
- sso_
target_ strurl - URL to send the SAML authentication requests to
- support_
groups bool - Should Cloudflare try to load groups from your account
- token_
url str - The token_endpoint URL of your IdP
- apps
Domain String - Your companies TLD
- attributes List<String>
- A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.
- auth
Url String - The authorization_endpoint URL of your IdP
- String
- Your okta authorization server id
- centrify
Account String - Your centrify account url
- centrify
App StringId - Your centrify app id
- certs
Url String - The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens
- claims List<String>
- Custom claims
- client
Id String - Your OAuth Client ID
- client
Secret String - Your OAuth Client Secret
- conditional
Access BooleanEnabled - Should Cloudflare try to load authentication contexts from your account
- directory
Id String - Your Azure directory uuid
- email
Attribute StringName - The attribute name for email in the SAML response.
- email
Claim StringName - The claim name for email in the id_token response.
- header
Attributes List<Property Map> - Add a list of attribute names that will be returned in the response header from the Access callback.
- idp
Public List<String>Certs - X509 certificate to verify the signature in the SAML authentication response
- issuer
Url String - IdP Entity ID or Issuer URL
- okta
Account String - Your okta account url
- onelogin
Account String - Your OneLogin account url
- ping
Env StringId - Your PingOne environment identifier
- pkce
Enabled Boolean - Enable Proof Key for Code Exchange (PKCE)
- prompt String
- Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interactionrequired error. prompt=selectaccount interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether. Available values: "login", "select_account", "none".
- scopes List<String>
- OAuth scopes
- sign
Request Boolean - Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.
- sso
Target StringUrl - URL to send the SAML authentication requests to
- support
Groups Boolean - Should Cloudflare try to load groups from your account
- token
Url String - The token_endpoint URL of your IdP
GetZeroTrustAccessIdentityProvidersResultConfigHeaderAttribute
- Attribute
Name string - attribute name from the IDP
- Header
Name string - header that will be added on the request to the origin
- Attribute
Name string - attribute name from the IDP
- Header
Name string - header that will be added on the request to the origin
- attribute
Name String - attribute name from the IDP
- header
Name String - header that will be added on the request to the origin
- attribute
Name string - attribute name from the IDP
- header
Name string - header that will be added on the request to the origin
- attribute_
name str - attribute name from the IDP
- header_
name str - header that will be added on the request to the origin
- attribute
Name String - attribute name from the IDP
- header
Name String - header that will be added on the request to the origin
GetZeroTrustAccessIdentityProvidersResultScimConfig
- Enabled bool
- A flag to enable or disable SCIM for the identity provider.
- Identity
Update stringBehavior - Indicates how a SCIM event updates a user identity used for policy evaluation. Use "automatic" to automatically update a user's identity and augment it with fields from the SCIM user resource. Use "reauth" to force re-authentication on group membership updates, user identity update will only occur after successful re-authentication. With "reauth" identities will not contain fields from the SCIM user resource. With "noaction" identities will not be changed by SCIM updates in any way and users will not be prompted to reauthenticate. Available values: "automatic", "reauth", "noaction".
- Scim
Base stringUrl - The base URL of Cloudflare's SCIM V2.0 API endpoint.
- Seat
Deprovision bool - A flag to remove a user's seat in Zero Trust when they have been deprovisioned in the Identity Provider. This cannot be enabled unless user_deprovision is also enabled.
- Secret string
- A read-only token generated when the SCIM integration is enabled for the first time. It is redacted on subsequent requests. If you lose this you will need to refresh it at /access/identityproviders/:idpID/refreshscim_secret.
- User
Deprovision bool - A flag to enable revoking a user's session in Access and Gateway when they have been deprovisioned in the Identity Provider.
- Enabled bool
- A flag to enable or disable SCIM for the identity provider.
- Identity
Update stringBehavior - Indicates how a SCIM event updates a user identity used for policy evaluation. Use "automatic" to automatically update a user's identity and augment it with fields from the SCIM user resource. Use "reauth" to force re-authentication on group membership updates, user identity update will only occur after successful re-authentication. With "reauth" identities will not contain fields from the SCIM user resource. With "noaction" identities will not be changed by SCIM updates in any way and users will not be prompted to reauthenticate. Available values: "automatic", "reauth", "noaction".
- Scim
Base stringUrl - The base URL of Cloudflare's SCIM V2.0 API endpoint.
- Seat
Deprovision bool - A flag to remove a user's seat in Zero Trust when they have been deprovisioned in the Identity Provider. This cannot be enabled unless user_deprovision is also enabled.
- Secret string
- A read-only token generated when the SCIM integration is enabled for the first time. It is redacted on subsequent requests. If you lose this you will need to refresh it at /access/identityproviders/:idpID/refreshscim_secret.
- User
Deprovision bool - A flag to enable revoking a user's session in Access and Gateway when they have been deprovisioned in the Identity Provider.
- enabled Boolean
- A flag to enable or disable SCIM for the identity provider.
- identity
Update StringBehavior - Indicates how a SCIM event updates a user identity used for policy evaluation. Use "automatic" to automatically update a user's identity and augment it with fields from the SCIM user resource. Use "reauth" to force re-authentication on group membership updates, user identity update will only occur after successful re-authentication. With "reauth" identities will not contain fields from the SCIM user resource. With "noaction" identities will not be changed by SCIM updates in any way and users will not be prompted to reauthenticate. Available values: "automatic", "reauth", "noaction".
- scim
Base StringUrl - The base URL of Cloudflare's SCIM V2.0 API endpoint.
- seat
Deprovision Boolean - A flag to remove a user's seat in Zero Trust when they have been deprovisioned in the Identity Provider. This cannot be enabled unless user_deprovision is also enabled.
- secret String
- A read-only token generated when the SCIM integration is enabled for the first time. It is redacted on subsequent requests. If you lose this you will need to refresh it at /access/identityproviders/:idpID/refreshscim_secret.
- user
Deprovision Boolean - A flag to enable revoking a user's session in Access and Gateway when they have been deprovisioned in the Identity Provider.
- enabled boolean
- A flag to enable or disable SCIM for the identity provider.
- identity
Update stringBehavior - Indicates how a SCIM event updates a user identity used for policy evaluation. Use "automatic" to automatically update a user's identity and augment it with fields from the SCIM user resource. Use "reauth" to force re-authentication on group membership updates, user identity update will only occur after successful re-authentication. With "reauth" identities will not contain fields from the SCIM user resource. With "noaction" identities will not be changed by SCIM updates in any way and users will not be prompted to reauthenticate. Available values: "automatic", "reauth", "noaction".
- scim
Base stringUrl - The base URL of Cloudflare's SCIM V2.0 API endpoint.
- seat
Deprovision boolean - A flag to remove a user's seat in Zero Trust when they have been deprovisioned in the Identity Provider. This cannot be enabled unless user_deprovision is also enabled.
- secret string
- A read-only token generated when the SCIM integration is enabled for the first time. It is redacted on subsequent requests. If you lose this you will need to refresh it at /access/identityproviders/:idpID/refreshscim_secret.
- user
Deprovision boolean - A flag to enable revoking a user's session in Access and Gateway when they have been deprovisioned in the Identity Provider.
- enabled bool
- A flag to enable or disable SCIM for the identity provider.
- identity_
update_ strbehavior - Indicates how a SCIM event updates a user identity used for policy evaluation. Use "automatic" to automatically update a user's identity and augment it with fields from the SCIM user resource. Use "reauth" to force re-authentication on group membership updates, user identity update will only occur after successful re-authentication. With "reauth" identities will not contain fields from the SCIM user resource. With "noaction" identities will not be changed by SCIM updates in any way and users will not be prompted to reauthenticate. Available values: "automatic", "reauth", "noaction".
- scim_
base_ strurl - The base URL of Cloudflare's SCIM V2.0 API endpoint.
- seat_
deprovision bool - A flag to remove a user's seat in Zero Trust when they have been deprovisioned in the Identity Provider. This cannot be enabled unless user_deprovision is also enabled.
- secret str
- A read-only token generated when the SCIM integration is enabled for the first time. It is redacted on subsequent requests. If you lose this you will need to refresh it at /access/identityproviders/:idpID/refreshscim_secret.
- user_
deprovision bool - A flag to enable revoking a user's session in Access and Gateway when they have been deprovisioned in the Identity Provider.
- enabled Boolean
- A flag to enable or disable SCIM for the identity provider.
- identity
Update StringBehavior - Indicates how a SCIM event updates a user identity used for policy evaluation. Use "automatic" to automatically update a user's identity and augment it with fields from the SCIM user resource. Use "reauth" to force re-authentication on group membership updates, user identity update will only occur after successful re-authentication. With "reauth" identities will not contain fields from the SCIM user resource. With "noaction" identities will not be changed by SCIM updates in any way and users will not be prompted to reauthenticate. Available values: "automatic", "reauth", "noaction".
- scim
Base StringUrl - The base URL of Cloudflare's SCIM V2.0 API endpoint.
- seat
Deprovision Boolean - A flag to remove a user's seat in Zero Trust when they have been deprovisioned in the Identity Provider. This cannot be enabled unless user_deprovision is also enabled.
- secret String
- A read-only token generated when the SCIM integration is enabled for the first time. It is redacted on subsequent requests. If you lose this you will need to refresh it at /access/identityproviders/:idpID/refreshscim_secret.
- user
Deprovision Boolean - A flag to enable revoking a user's session in Access and Gateway when they have been deprovisioned in the Identity Provider.
Package Details
- Repository
- Cloudflare pulumi/pulumi-cloudflare
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
cloudflare
Terraform Provider.