gcp.identityplatform.InboundSamlConfig
Inbound SAML configuration for a Identity Toolkit project.
You must enable the Google Identity Platform in the marketplace prior to using this resource.
Example Usage
Identity Platform Inbound Saml Config Basic
import * as pulumi from "@pulumi/pulumi";
import * as gcp from "@pulumi/gcp";
import * as std from "@pulumi/std";
const samlConfig = new gcp.identityplatform.InboundSamlConfig("saml_config", {
    name: "saml.tf-config",
    displayName: "Display Name",
    idpConfig: {
        idpEntityId: "tf-idp",
        signRequest: true,
        ssoUrl: "https://example.com",
        idpCertificates: [{
            x509Certificate: std.file({
                input: "test-fixtures/rsa_cert.pem",
            }).then(invoke => invoke.result),
        }],
    },
    spConfig: {
        spEntityId: "tf-sp",
        callbackUri: "https://example.com",
    },
});
import pulumi
import pulumi_gcp as gcp
import pulumi_std as std
saml_config = gcp.identityplatform.InboundSamlConfig("saml_config",
    name="saml.tf-config",
    display_name="Display Name",
    idp_config={
        "idp_entity_id": "tf-idp",
        "sign_request": True,
        "sso_url": "https://example.com",
        "idp_certificates": [{
            "x509_certificate": std.file(input="test-fixtures/rsa_cert.pem").result,
        }],
    },
    sp_config={
        "sp_entity_id": "tf-sp",
        "callback_uri": "https://example.com",
    })
package main
import (
	"github.com/pulumi/pulumi-gcp/sdk/v9/go/gcp/identityplatform"
	"github.com/pulumi/pulumi-std/sdk/go/std"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		invokeFile, err := std.File(ctx, &std.FileArgs{
			Input: "test-fixtures/rsa_cert.pem",
		}, nil)
		if err != nil {
			return err
		}
		_, err = identityplatform.NewInboundSamlConfig(ctx, "saml_config", &identityplatform.InboundSamlConfigArgs{
			Name:        pulumi.String("saml.tf-config"),
			DisplayName: pulumi.String("Display Name"),
			IdpConfig: &identityplatform.InboundSamlConfigIdpConfigArgs{
				IdpEntityId: pulumi.String("tf-idp"),
				SignRequest: pulumi.Bool(true),
				SsoUrl:      pulumi.String("https://example.com"),
				IdpCertificates: identityplatform.InboundSamlConfigIdpConfigIdpCertificateArray{
					&identityplatform.InboundSamlConfigIdpConfigIdpCertificateArgs{
						X509Certificate: pulumi.String(invokeFile.Result),
					},
				},
			},
			SpConfig: &identityplatform.InboundSamlConfigSpConfigArgs{
				SpEntityId:  pulumi.String("tf-sp"),
				CallbackUri: pulumi.String("https://example.com"),
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Gcp = Pulumi.Gcp;
using Std = Pulumi.Std;
return await Deployment.RunAsync(() => 
{
    var samlConfig = new Gcp.IdentityPlatform.InboundSamlConfig("saml_config", new()
    {
        Name = "saml.tf-config",
        DisplayName = "Display Name",
        IdpConfig = new Gcp.IdentityPlatform.Inputs.InboundSamlConfigIdpConfigArgs
        {
            IdpEntityId = "tf-idp",
            SignRequest = true,
            SsoUrl = "https://example.com",
            IdpCertificates = new[]
            {
                new Gcp.IdentityPlatform.Inputs.InboundSamlConfigIdpConfigIdpCertificateArgs
                {
                    X509Certificate = Std.File.Invoke(new()
                    {
                        Input = "test-fixtures/rsa_cert.pem",
                    }).Apply(invoke => invoke.Result),
                },
            },
        },
        SpConfig = new Gcp.IdentityPlatform.Inputs.InboundSamlConfigSpConfigArgs
        {
            SpEntityId = "tf-sp",
            CallbackUri = "https://example.com",
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.identityplatform.InboundSamlConfig;
import com.pulumi.gcp.identityplatform.InboundSamlConfigArgs;
import com.pulumi.gcp.identityplatform.inputs.InboundSamlConfigIdpConfigArgs;
import com.pulumi.gcp.identityplatform.inputs.InboundSamlConfigSpConfigArgs;
import com.pulumi.std.StdFunctions;
import com.pulumi.std.inputs.FileArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var samlConfig = new InboundSamlConfig("samlConfig", InboundSamlConfigArgs.builder()
            .name("saml.tf-config")
            .displayName("Display Name")
            .idpConfig(InboundSamlConfigIdpConfigArgs.builder()
                .idpEntityId("tf-idp")
                .signRequest(true)
                .ssoUrl("https://example.com")
                .idpCertificates(InboundSamlConfigIdpConfigIdpCertificateArgs.builder()
                    .x509Certificate(StdFunctions.file(FileArgs.builder()
                        .input("test-fixtures/rsa_cert.pem")
                        .build()).result())
                    .build())
                .build())
            .spConfig(InboundSamlConfigSpConfigArgs.builder()
                .spEntityId("tf-sp")
                .callbackUri("https://example.com")
                .build())
            .build());
    }
}
resources:
  samlConfig:
    type: gcp:identityplatform:InboundSamlConfig
    name: saml_config
    properties:
      name: saml.tf-config
      displayName: Display Name
      idpConfig:
        idpEntityId: tf-idp
        signRequest: true
        ssoUrl: https://example.com
        idpCertificates:
          - x509Certificate:
              fn::invoke:
                function: std:file
                arguments:
                  input: test-fixtures/rsa_cert.pem
                return: result
      spConfig:
        spEntityId: tf-sp
        callbackUri: https://example.com
Create InboundSamlConfig Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new InboundSamlConfig(name: string, args: InboundSamlConfigArgs, opts?: CustomResourceOptions);@overload
def InboundSamlConfig(resource_name: str,
                      args: InboundSamlConfigArgs,
                      opts: Optional[ResourceOptions] = None)
@overload
def InboundSamlConfig(resource_name: str,
                      opts: Optional[ResourceOptions] = None,
                      display_name: Optional[str] = None,
                      idp_config: Optional[InboundSamlConfigIdpConfigArgs] = None,
                      sp_config: Optional[InboundSamlConfigSpConfigArgs] = None,
                      enabled: Optional[bool] = None,
                      name: Optional[str] = None,
                      project: Optional[str] = None)func NewInboundSamlConfig(ctx *Context, name string, args InboundSamlConfigArgs, opts ...ResourceOption) (*InboundSamlConfig, error)public InboundSamlConfig(string name, InboundSamlConfigArgs args, CustomResourceOptions? opts = null)
public InboundSamlConfig(String name, InboundSamlConfigArgs args)
public InboundSamlConfig(String name, InboundSamlConfigArgs args, CustomResourceOptions options)
type: gcp:identityplatform:InboundSamlConfig
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args InboundSamlConfigArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args InboundSamlConfigArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args InboundSamlConfigArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args InboundSamlConfigArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args InboundSamlConfigArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var inboundSamlConfigResource = new Gcp.IdentityPlatform.InboundSamlConfig("inboundSamlConfigResource", new()
{
    DisplayName = "string",
    IdpConfig = new Gcp.IdentityPlatform.Inputs.InboundSamlConfigIdpConfigArgs
    {
        IdpCertificates = new[]
        {
            new Gcp.IdentityPlatform.Inputs.InboundSamlConfigIdpConfigIdpCertificateArgs
            {
                X509Certificate = "string",
            },
        },
        IdpEntityId = "string",
        SsoUrl = "string",
        SignRequest = false,
    },
    SpConfig = new Gcp.IdentityPlatform.Inputs.InboundSamlConfigSpConfigArgs
    {
        CallbackUri = "string",
        SpCertificates = new[]
        {
            new Gcp.IdentityPlatform.Inputs.InboundSamlConfigSpConfigSpCertificateArgs
            {
                X509Certificate = "string",
            },
        },
        SpEntityId = "string",
    },
    Enabled = false,
    Name = "string",
    Project = "string",
});
example, err := identityplatform.NewInboundSamlConfig(ctx, "inboundSamlConfigResource", &identityplatform.InboundSamlConfigArgs{
	DisplayName: pulumi.String("string"),
	IdpConfig: &identityplatform.InboundSamlConfigIdpConfigArgs{
		IdpCertificates: identityplatform.InboundSamlConfigIdpConfigIdpCertificateArray{
			&identityplatform.InboundSamlConfigIdpConfigIdpCertificateArgs{
				X509Certificate: pulumi.String("string"),
			},
		},
		IdpEntityId: pulumi.String("string"),
		SsoUrl:      pulumi.String("string"),
		SignRequest: pulumi.Bool(false),
	},
	SpConfig: &identityplatform.InboundSamlConfigSpConfigArgs{
		CallbackUri: pulumi.String("string"),
		SpCertificates: identityplatform.InboundSamlConfigSpConfigSpCertificateArray{
			&identityplatform.InboundSamlConfigSpConfigSpCertificateArgs{
				X509Certificate: pulumi.String("string"),
			},
		},
		SpEntityId: pulumi.String("string"),
	},
	Enabled: pulumi.Bool(false),
	Name:    pulumi.String("string"),
	Project: pulumi.String("string"),
})
var inboundSamlConfigResource = new InboundSamlConfig("inboundSamlConfigResource", InboundSamlConfigArgs.builder()
    .displayName("string")
    .idpConfig(InboundSamlConfigIdpConfigArgs.builder()
        .idpCertificates(InboundSamlConfigIdpConfigIdpCertificateArgs.builder()
            .x509Certificate("string")
            .build())
        .idpEntityId("string")
        .ssoUrl("string")
        .signRequest(false)
        .build())
    .spConfig(InboundSamlConfigSpConfigArgs.builder()
        .callbackUri("string")
        .spCertificates(InboundSamlConfigSpConfigSpCertificateArgs.builder()
            .x509Certificate("string")
            .build())
        .spEntityId("string")
        .build())
    .enabled(false)
    .name("string")
    .project("string")
    .build());
inbound_saml_config_resource = gcp.identityplatform.InboundSamlConfig("inboundSamlConfigResource",
    display_name="string",
    idp_config={
        "idp_certificates": [{
            "x509_certificate": "string",
        }],
        "idp_entity_id": "string",
        "sso_url": "string",
        "sign_request": False,
    },
    sp_config={
        "callback_uri": "string",
        "sp_certificates": [{
            "x509_certificate": "string",
        }],
        "sp_entity_id": "string",
    },
    enabled=False,
    name="string",
    project="string")
const inboundSamlConfigResource = new gcp.identityplatform.InboundSamlConfig("inboundSamlConfigResource", {
    displayName: "string",
    idpConfig: {
        idpCertificates: [{
            x509Certificate: "string",
        }],
        idpEntityId: "string",
        ssoUrl: "string",
        signRequest: false,
    },
    spConfig: {
        callbackUri: "string",
        spCertificates: [{
            x509Certificate: "string",
        }],
        spEntityId: "string",
    },
    enabled: false,
    name: "string",
    project: "string",
});
type: gcp:identityplatform:InboundSamlConfig
properties:
    displayName: string
    enabled: false
    idpConfig:
        idpCertificates:
            - x509Certificate: string
        idpEntityId: string
        signRequest: false
        ssoUrl: string
    name: string
    project: string
    spConfig:
        callbackUri: string
        spCertificates:
            - x509Certificate: string
        spEntityId: string
InboundSamlConfig Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The InboundSamlConfig resource accepts the following input properties:
- DisplayName string
- Human friendly display name.
- IdpConfig InboundSaml Config Idp Config 
- SAML IdP configuration when the project acts as the relying party Structure is documented below.
- SpConfig InboundSaml Config Sp Config 
- SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- Enabled bool
- If this config allows users to sign in with the provider.
- Name string
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- DisplayName string
- Human friendly display name.
- IdpConfig InboundSaml Config Idp Config Args 
- SAML IdP configuration when the project acts as the relying party Structure is documented below.
- SpConfig InboundSaml Config Sp Config Args 
- SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- Enabled bool
- If this config allows users to sign in with the provider.
- Name string
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- displayName String
- Human friendly display name.
- idpConfig InboundSaml Config Idp Config 
- SAML IdP configuration when the project acts as the relying party Structure is documented below.
- spConfig InboundSaml Config Sp Config 
- SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- enabled Boolean
- If this config allows users to sign in with the provider.
- name String
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project String
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- displayName string
- Human friendly display name.
- idpConfig InboundSaml Config Idp Config 
- SAML IdP configuration when the project acts as the relying party Structure is documented below.
- spConfig InboundSaml Config Sp Config 
- SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- enabled boolean
- If this config allows users to sign in with the provider.
- name string
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project string
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- display_name str
- Human friendly display name.
- idp_config InboundSaml Config Idp Config Args 
- SAML IdP configuration when the project acts as the relying party Structure is documented below.
- sp_config InboundSaml Config Sp Config Args 
- SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- enabled bool
- If this config allows users to sign in with the provider.
- name str
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project str
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- displayName String
- Human friendly display name.
- idpConfig Property Map
- SAML IdP configuration when the project acts as the relying party Structure is documented below.
- spConfig Property Map
- SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- enabled Boolean
- If this config allows users to sign in with the provider.
- name String
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project String
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
Outputs
All input properties are implicitly available as output properties. Additionally, the InboundSamlConfig resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing InboundSamlConfig Resource
Get an existing InboundSamlConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: InboundSamlConfigState, opts?: CustomResourceOptions): InboundSamlConfig@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        display_name: Optional[str] = None,
        enabled: Optional[bool] = None,
        idp_config: Optional[InboundSamlConfigIdpConfigArgs] = None,
        name: Optional[str] = None,
        project: Optional[str] = None,
        sp_config: Optional[InboundSamlConfigSpConfigArgs] = None) -> InboundSamlConfigfunc GetInboundSamlConfig(ctx *Context, name string, id IDInput, state *InboundSamlConfigState, opts ...ResourceOption) (*InboundSamlConfig, error)public static InboundSamlConfig Get(string name, Input<string> id, InboundSamlConfigState? state, CustomResourceOptions? opts = null)public static InboundSamlConfig get(String name, Output<String> id, InboundSamlConfigState state, CustomResourceOptions options)resources:  _:    type: gcp:identityplatform:InboundSamlConfig    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- DisplayName string
- Human friendly display name.
- Enabled bool
- If this config allows users to sign in with the provider.
- IdpConfig InboundSaml Config Idp Config 
- SAML IdP configuration when the project acts as the relying party Structure is documented below.
- Name string
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- SpConfig InboundSaml Config Sp Config 
- SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- DisplayName string
- Human friendly display name.
- Enabled bool
- If this config allows users to sign in with the provider.
- IdpConfig InboundSaml Config Idp Config Args 
- SAML IdP configuration when the project acts as the relying party Structure is documented below.
- Name string
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- Project string
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- SpConfig InboundSaml Config Sp Config Args 
- SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- displayName String
- Human friendly display name.
- enabled Boolean
- If this config allows users to sign in with the provider.
- idpConfig InboundSaml Config Idp Config 
- SAML IdP configuration when the project acts as the relying party Structure is documented below.
- name String
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project String
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- spConfig InboundSaml Config Sp Config 
- SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- displayName string
- Human friendly display name.
- enabled boolean
- If this config allows users to sign in with the provider.
- idpConfig InboundSaml Config Idp Config 
- SAML IdP configuration when the project acts as the relying party Structure is documented below.
- name string
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project string
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- spConfig InboundSaml Config Sp Config 
- SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- display_name str
- Human friendly display name.
- enabled bool
- If this config allows users to sign in with the provider.
- idp_config InboundSaml Config Idp Config Args 
- SAML IdP configuration when the project acts as the relying party Structure is documented below.
- name str
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project str
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- sp_config InboundSaml Config Sp Config Args 
- SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
- displayName String
- Human friendly display name.
- enabled Boolean
- If this config allows users to sign in with the provider.
- idpConfig Property Map
- SAML IdP configuration when the project acts as the relying party Structure is documented below.
- name String
- The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
- project String
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- spConfig Property Map
- SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
Supporting Types
InboundSamlConfigIdpConfig, InboundSamlConfigIdpConfigArgs          
- IdpCertificates List<InboundSaml Config Idp Config Idp Certificate> 
- The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- IdpEntity stringId 
- Unique identifier for all SAML entities
- SsoUrl string
- URL to send Authentication request to.
- SignRequest bool
- Indicates if outbounding SAMLRequest should be signed.
- IdpCertificates []InboundSaml Config Idp Config Idp Certificate 
- The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- IdpEntity stringId 
- Unique identifier for all SAML entities
- SsoUrl string
- URL to send Authentication request to.
- SignRequest bool
- Indicates if outbounding SAMLRequest should be signed.
- idpCertificates List<InboundSaml Config Idp Config Idp Certificate> 
- The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- idpEntity StringId 
- Unique identifier for all SAML entities
- ssoUrl String
- URL to send Authentication request to.
- signRequest Boolean
- Indicates if outbounding SAMLRequest should be signed.
- idpCertificates InboundSaml Config Idp Config Idp Certificate[] 
- The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- idpEntity stringId 
- Unique identifier for all SAML entities
- ssoUrl string
- URL to send Authentication request to.
- signRequest boolean
- Indicates if outbounding SAMLRequest should be signed.
- idp_certificates Sequence[InboundSaml Config Idp Config Idp Certificate] 
- The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- idp_entity_ strid 
- Unique identifier for all SAML entities
- sso_url str
- URL to send Authentication request to.
- sign_request bool
- Indicates if outbounding SAMLRequest should be signed.
- idpCertificates List<Property Map>
- The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
- idpEntity StringId 
- Unique identifier for all SAML entities
- ssoUrl String
- URL to send Authentication request to.
- signRequest Boolean
- Indicates if outbounding SAMLRequest should be signed.
InboundSamlConfigIdpConfigIdpCertificate, InboundSamlConfigIdpConfigIdpCertificateArgs              
- X509Certificate string
- The IdP's x509 certificate.
- X509Certificate string
- The IdP's x509 certificate.
- x509Certificate String
- The IdP's x509 certificate.
- x509Certificate string
- The IdP's x509 certificate.
- x509_certificate str
- The IdP's x509 certificate.
- x509Certificate String
- The IdP's x509 certificate.
InboundSamlConfigSpConfig, InboundSamlConfigSpConfigArgs          
- CallbackUri string
- Callback URI where responses from IDP are handled. Must start with https://.
- SpCertificates List<InboundSaml Config Sp Config Sp Certificate> 
- (Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below. - The - sp_certificatesblock contains:
- SpEntity stringId 
- Unique identifier for all SAML entities.
- CallbackUri string
- Callback URI where responses from IDP are handled. Must start with https://.
- SpCertificates []InboundSaml Config Sp Config Sp Certificate 
- (Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below. - The - sp_certificatesblock contains:
- SpEntity stringId 
- Unique identifier for all SAML entities.
- callbackUri String
- Callback URI where responses from IDP are handled. Must start with https://.
- spCertificates List<InboundSaml Config Sp Config Sp Certificate> 
- (Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below. - The - sp_certificatesblock contains:
- spEntity StringId 
- Unique identifier for all SAML entities.
- callbackUri string
- Callback URI where responses from IDP are handled. Must start with https://.
- spCertificates InboundSaml Config Sp Config Sp Certificate[] 
- (Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below. - The - sp_certificatesblock contains:
- spEntity stringId 
- Unique identifier for all SAML entities.
- callback_uri str
- Callback URI where responses from IDP are handled. Must start with https://.
- sp_certificates Sequence[InboundSaml Config Sp Config Sp Certificate] 
- (Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below. - The - sp_certificatesblock contains:
- sp_entity_ strid 
- Unique identifier for all SAML entities.
- callbackUri String
- Callback URI where responses from IDP are handled. Must start with https://.
- spCertificates List<Property Map>
- (Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below. - The - sp_certificatesblock contains:
- spEntity StringId 
- Unique identifier for all SAML entities.
InboundSamlConfigSpConfigSpCertificate, InboundSamlConfigSpConfigSpCertificateArgs              
- X509Certificate string
- The x509 certificate
- X509Certificate string
- The x509 certificate
- x509Certificate String
- The x509 certificate
- x509Certificate string
- The x509 certificate
- x509_certificate str
- The x509 certificate
- x509Certificate String
- The x509 certificate
Import
InboundSamlConfig can be imported using any of these accepted formats:
- projects/{{project}}/inboundSamlConfigs/{{name}}
- {{project}}/{{name}}
- {{name}}
When using the pulumi import command, InboundSamlConfig can be imported using one of the formats above. For example:
$ pulumi import gcp:identityplatform/inboundSamlConfig:InboundSamlConfig default projects/{{project}}/inboundSamlConfigs/{{name}}
$ pulumi import gcp:identityplatform/inboundSamlConfig:InboundSamlConfig default {{project}}/{{name}}
$ pulumi import gcp:identityplatform/inboundSamlConfig:InboundSamlConfig default {{name}}
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Google Cloud (GCP) Classic pulumi/pulumi-gcp
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the google-betaTerraform Provider.
