published on Thursday, Mar 12, 2026 by kong
published on Thursday, Mar 12, 2026 by kong
IdentityProvider Resource
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as konnect from "@pulumi/konnect";
const myIdentityprovider = new konnect.IdentityProvider("my_identityprovider", {
config: {
samlIdentityProviderConfig: {
idpMetadataUrl: "https://mocksaml.com/api/saml/metadata",
idpMetadataXml: `<?xml version="1.0" encoding="UTF-8"?>
<EntityDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata">
<!-- SAML metadata content here -->
</EntityDescriptor>
`,
},
},
enabled: true,
loginPath: "myapp",
type: "oidc",
});
import pulumi
import pulumi_konnect as konnect
my_identityprovider = konnect.IdentityProvider("my_identityprovider",
config={
"saml_identity_provider_config": {
"idp_metadata_url": "https://mocksaml.com/api/saml/metadata",
"idp_metadata_xml": """<?xml version="1.0" encoding="UTF-8"?>
<EntityDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata">
<!-- SAML metadata content here -->
</EntityDescriptor>
""",
},
},
enabled=True,
login_path="myapp",
type="oidc")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/konnect/v3/konnect"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := konnect.NewIdentityProvider(ctx, "my_identityprovider", &konnect.IdentityProviderArgs{
Config: &konnect.IdentityProviderConfigArgs{
SamlIdentityProviderConfig: &konnect.IdentityProviderConfigSamlIdentityProviderConfigArgs{
IdpMetadataUrl: pulumi.String("https://mocksaml.com/api/saml/metadata"),
IdpMetadataXml: pulumi.String("<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<EntityDescriptor xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\">\n <!-- SAML metadata content here -->\n</EntityDescriptor>\n"),
},
},
Enabled: pulumi.Bool(true),
LoginPath: pulumi.String("myapp"),
Type: pulumi.String("oidc"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Konnect = Pulumi.Konnect;
return await Deployment.RunAsync(() =>
{
var myIdentityprovider = new Konnect.IdentityProvider("my_identityprovider", new()
{
Config = new Konnect.Inputs.IdentityProviderConfigArgs
{
SamlIdentityProviderConfig = new Konnect.Inputs.IdentityProviderConfigSamlIdentityProviderConfigArgs
{
IdpMetadataUrl = "https://mocksaml.com/api/saml/metadata",
IdpMetadataXml = @"<?xml version=""1.0"" encoding=""UTF-8""?>
<EntityDescriptor xmlns=""urn:oasis:names:tc:SAML:2.0:metadata"">
<!-- SAML metadata content here -->
</EntityDescriptor>
",
},
},
Enabled = true,
LoginPath = "myapp",
Type = "oidc",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.konnect.IdentityProvider;
import com.pulumi.konnect.IdentityProviderArgs;
import com.pulumi.konnect.inputs.IdentityProviderConfigArgs;
import com.pulumi.konnect.inputs.IdentityProviderConfigSamlIdentityProviderConfigArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var myIdentityprovider = new IdentityProvider("myIdentityprovider", IdentityProviderArgs.builder()
.config(IdentityProviderConfigArgs.builder()
.samlIdentityProviderConfig(IdentityProviderConfigSamlIdentityProviderConfigArgs.builder()
.idpMetadataUrl("https://mocksaml.com/api/saml/metadata")
.idpMetadataXml("""
<?xml version="1.0" encoding="UTF-8"?>
<EntityDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata">
<!-- SAML metadata content here -->
</EntityDescriptor>
""")
.build())
.build())
.enabled(true)
.loginPath("myapp")
.type("oidc")
.build());
}
}
resources:
myIdentityprovider:
type: konnect:IdentityProvider
name: my_identityprovider
properties:
config:
samlIdentityProviderConfig:
idpMetadataUrl: https://mocksaml.com/api/saml/metadata
idpMetadataXml: |
<?xml version="1.0" encoding="UTF-8"?>
<EntityDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata">
<!-- SAML metadata content here -->
</EntityDescriptor>
enabled: true
loginPath: myapp
type: oidc
Create IdentityProvider Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new IdentityProvider(name: string, args?: IdentityProviderArgs, opts?: CustomResourceOptions);@overload
def IdentityProvider(resource_name: str,
args: Optional[IdentityProviderArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def IdentityProvider(resource_name: str,
opts: Optional[ResourceOptions] = None,
config: Optional[IdentityProviderConfigArgs] = None,
enabled: Optional[bool] = None,
login_path: Optional[str] = None,
type: Optional[str] = None)func NewIdentityProvider(ctx *Context, name string, args *IdentityProviderArgs, opts ...ResourceOption) (*IdentityProvider, error)public IdentityProvider(string name, IdentityProviderArgs? args = null, CustomResourceOptions? opts = null)
public IdentityProvider(String name, IdentityProviderArgs args)
public IdentityProvider(String name, IdentityProviderArgs args, CustomResourceOptions options)
type: konnect:IdentityProvider
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args IdentityProviderArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args IdentityProviderArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args IdentityProviderArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args IdentityProviderArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args IdentityProviderArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var identityProviderResource = new Konnect.IdentityProvider("identityProviderResource", new()
{
Config = new Konnect.Inputs.IdentityProviderConfigArgs
{
OidcIdentityProviderConfig = new Konnect.Inputs.IdentityProviderConfigOidcIdentityProviderConfigArgs
{
ClaimMappings = new Konnect.Inputs.IdentityProviderConfigOidcIdentityProviderConfigClaimMappingsArgs
{
Email = "string",
Groups = "string",
Name = "string",
},
ClientId = "string",
ClientSecret = "string",
IssuerUrl = "string",
Scopes = new[]
{
"string",
},
},
SamlIdentityProviderConfig = new Konnect.Inputs.IdentityProviderConfigSamlIdentityProviderConfigArgs
{
CallbackUrl = "string",
IdpMetadataUrl = "string",
IdpMetadataXml = "string",
LoginUrl = "string",
SpEntityId = "string",
SpMetadataUrl = "string",
},
},
Enabled = false,
LoginPath = "string",
Type = "string",
});
example, err := konnect.NewIdentityProvider(ctx, "identityProviderResource", &konnect.IdentityProviderArgs{
Config: &konnect.IdentityProviderConfigArgs{
OidcIdentityProviderConfig: &konnect.IdentityProviderConfigOidcIdentityProviderConfigArgs{
ClaimMappings: &konnect.IdentityProviderConfigOidcIdentityProviderConfigClaimMappingsArgs{
Email: pulumi.String("string"),
Groups: pulumi.String("string"),
Name: pulumi.String("string"),
},
ClientId: pulumi.String("string"),
ClientSecret: pulumi.String("string"),
IssuerUrl: pulumi.String("string"),
Scopes: pulumi.StringArray{
pulumi.String("string"),
},
},
SamlIdentityProviderConfig: &konnect.IdentityProviderConfigSamlIdentityProviderConfigArgs{
CallbackUrl: pulumi.String("string"),
IdpMetadataUrl: pulumi.String("string"),
IdpMetadataXml: pulumi.String("string"),
LoginUrl: pulumi.String("string"),
SpEntityId: pulumi.String("string"),
SpMetadataUrl: pulumi.String("string"),
},
},
Enabled: pulumi.Bool(false),
LoginPath: pulumi.String("string"),
Type: pulumi.String("string"),
})
var identityProviderResource = new IdentityProvider("identityProviderResource", IdentityProviderArgs.builder()
.config(IdentityProviderConfigArgs.builder()
.oidcIdentityProviderConfig(IdentityProviderConfigOidcIdentityProviderConfigArgs.builder()
.claimMappings(IdentityProviderConfigOidcIdentityProviderConfigClaimMappingsArgs.builder()
.email("string")
.groups("string")
.name("string")
.build())
.clientId("string")
.clientSecret("string")
.issuerUrl("string")
.scopes("string")
.build())
.samlIdentityProviderConfig(IdentityProviderConfigSamlIdentityProviderConfigArgs.builder()
.callbackUrl("string")
.idpMetadataUrl("string")
.idpMetadataXml("string")
.loginUrl("string")
.spEntityId("string")
.spMetadataUrl("string")
.build())
.build())
.enabled(false)
.loginPath("string")
.type("string")
.build());
identity_provider_resource = konnect.IdentityProvider("identityProviderResource",
config={
"oidc_identity_provider_config": {
"claim_mappings": {
"email": "string",
"groups": "string",
"name": "string",
},
"client_id": "string",
"client_secret": "string",
"issuer_url": "string",
"scopes": ["string"],
},
"saml_identity_provider_config": {
"callback_url": "string",
"idp_metadata_url": "string",
"idp_metadata_xml": "string",
"login_url": "string",
"sp_entity_id": "string",
"sp_metadata_url": "string",
},
},
enabled=False,
login_path="string",
type="string")
const identityProviderResource = new konnect.IdentityProvider("identityProviderResource", {
config: {
oidcIdentityProviderConfig: {
claimMappings: {
email: "string",
groups: "string",
name: "string",
},
clientId: "string",
clientSecret: "string",
issuerUrl: "string",
scopes: ["string"],
},
samlIdentityProviderConfig: {
callbackUrl: "string",
idpMetadataUrl: "string",
idpMetadataXml: "string",
loginUrl: "string",
spEntityId: "string",
spMetadataUrl: "string",
},
},
enabled: false,
loginPath: "string",
type: "string",
});
type: konnect:IdentityProvider
properties:
config:
oidcIdentityProviderConfig:
claimMappings:
email: string
groups: string
name: string
clientId: string
clientSecret: string
issuerUrl: string
scopes:
- string
samlIdentityProviderConfig:
callbackUrl: string
idpMetadataUrl: string
idpMetadataXml: string
loginUrl: string
spEntityId: string
spMetadataUrl: string
enabled: false
loginPath: string
type: string
IdentityProvider Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The IdentityProvider resource accepts the following input properties:
- Config
Identity
Provider Config - Enabled bool
- Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
- Login
Path string - The path used for initiating login requests with the identity provider.
- Type string
- Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
- Config
Identity
Provider Config Args - Enabled bool
- Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
- Login
Path string - The path used for initiating login requests with the identity provider.
- Type string
- Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
- config
Identity
Provider Config - enabled Boolean
- Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
- login
Path String - The path used for initiating login requests with the identity provider.
- type String
- Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
- config
Identity
Provider Config - enabled boolean
- Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
- login
Path string - The path used for initiating login requests with the identity provider.
- type string
- Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
- config
Identity
Provider Config Args - enabled bool
- Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
- login_
path str - The path used for initiating login requests with the identity provider.
- type str
- Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
- config Property Map
- enabled Boolean
- Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
- login
Path String - The path used for initiating login requests with the identity provider.
- type String
- Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
Outputs
All input properties are implicitly available as output properties. Additionally, the IdentityProvider resource produces the following output properties:
- created_
at str - An ISO-8601 timestamp representation of entity creation date.
- id str
- The provider-assigned unique ID for this managed resource.
- updated_
at str - An ISO-8601 timestamp representation of entity update date.
Look up Existing IdentityProvider Resource
Get an existing IdentityProvider resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: IdentityProviderState, opts?: CustomResourceOptions): IdentityProvider@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
config: Optional[IdentityProviderConfigArgs] = None,
created_at: Optional[str] = None,
enabled: Optional[bool] = None,
login_path: Optional[str] = None,
type: Optional[str] = None,
updated_at: Optional[str] = None) -> IdentityProviderfunc GetIdentityProvider(ctx *Context, name string, id IDInput, state *IdentityProviderState, opts ...ResourceOption) (*IdentityProvider, error)public static IdentityProvider Get(string name, Input<string> id, IdentityProviderState? state, CustomResourceOptions? opts = null)public static IdentityProvider get(String name, Output<String> id, IdentityProviderState state, CustomResourceOptions options)resources: _: type: konnect:IdentityProvider get: id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Config
Identity
Provider Config - Created
At string - An ISO-8601 timestamp representation of entity creation date.
- Enabled bool
- Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
- Login
Path string - The path used for initiating login requests with the identity provider.
- Type string
- Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
- Updated
At string - An ISO-8601 timestamp representation of entity update date.
- Config
Identity
Provider Config Args - Created
At string - An ISO-8601 timestamp representation of entity creation date.
- Enabled bool
- Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
- Login
Path string - The path used for initiating login requests with the identity provider.
- Type string
- Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
- Updated
At string - An ISO-8601 timestamp representation of entity update date.
- config
Identity
Provider Config - created
At String - An ISO-8601 timestamp representation of entity creation date.
- enabled Boolean
- Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
- login
Path String - The path used for initiating login requests with the identity provider.
- type String
- Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
- updated
At String - An ISO-8601 timestamp representation of entity update date.
- config
Identity
Provider Config - created
At string - An ISO-8601 timestamp representation of entity creation date.
- enabled boolean
- Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
- login
Path string - The path used for initiating login requests with the identity provider.
- type string
- Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
- updated
At string - An ISO-8601 timestamp representation of entity update date.
- config
Identity
Provider Config Args - created_
at str - An ISO-8601 timestamp representation of entity creation date.
- enabled bool
- Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
- login_
path str - The path used for initiating login requests with the identity provider.
- type str
- Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
- updated_
at str - An ISO-8601 timestamp representation of entity update date.
- config Property Map
- created
At String - An ISO-8601 timestamp representation of entity creation date.
- enabled Boolean
- Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
- login
Path String - The path used for initiating login requests with the identity provider.
- type String
- Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
- updated
At String - An ISO-8601 timestamp representation of entity update date.
Supporting Types
IdentityProviderConfig, IdentityProviderConfigArgs
- Oidc
Identity IdentityProvider Config Provider Config Oidc Identity Provider Config - The identity provider that contains configuration data for the OIDC authentication integration.
- Saml
Identity IdentityProvider Config Provider Config Saml Identity Provider Config - The identity provider that contains configuration data for the SAML authentication integration.
- Oidc
Identity IdentityProvider Config Provider Config Oidc Identity Provider Config - The identity provider that contains configuration data for the OIDC authentication integration.
- Saml
Identity IdentityProvider Config Provider Config Saml Identity Provider Config - The identity provider that contains configuration data for the SAML authentication integration.
- oidc
Identity IdentityProvider Config Provider Config Oidc Identity Provider Config - The identity provider that contains configuration data for the OIDC authentication integration.
- saml
Identity IdentityProvider Config Provider Config Saml Identity Provider Config - The identity provider that contains configuration data for the SAML authentication integration.
- oidc
Identity IdentityProvider Config Provider Config Oidc Identity Provider Config - The identity provider that contains configuration data for the OIDC authentication integration.
- saml
Identity IdentityProvider Config Provider Config Saml Identity Provider Config - The identity provider that contains configuration data for the SAML authentication integration.
- oidc_
identity_ Identityprovider_ config Provider Config Oidc Identity Provider Config - The identity provider that contains configuration data for the OIDC authentication integration.
- saml_
identity_ Identityprovider_ config Provider Config Saml Identity Provider Config - The identity provider that contains configuration data for the SAML authentication integration.
- oidc
Identity Property MapProvider Config - The identity provider that contains configuration data for the OIDC authentication integration.
- saml
Identity Property MapProvider Config - The identity provider that contains configuration data for the SAML authentication integration.
IdentityProviderConfigOidcIdentityProviderConfig, IdentityProviderConfigOidcIdentityProviderConfigArgs
- Claim
Mappings IdentityProvider Config Oidc Identity Provider Config Claim Mappings - Defines the mappings between OpenID Connect (OIDC) claims and local claims used by your application for authentication.
- Client
Id string - The client ID assigned to your application by the identity provider. Not Null
- Client
Secret string - The Client Secret assigned to your application by the identity provider.
- Issuer
Url string - The issuer URI of the identity provider. This is the URL where the provider's metadata can be obtained. Not Null
- Scopes List<string>
- The scopes requested by your application when authenticating with the identity provider. Default: ["email","openid","profile"]
- Claim
Mappings IdentityProvider Config Oidc Identity Provider Config Claim Mappings - Defines the mappings between OpenID Connect (OIDC) claims and local claims used by your application for authentication.
- Client
Id string - The client ID assigned to your application by the identity provider. Not Null
- Client
Secret string - The Client Secret assigned to your application by the identity provider.
- Issuer
Url string - The issuer URI of the identity provider. This is the URL where the provider's metadata can be obtained. Not Null
- Scopes []string
- The scopes requested by your application when authenticating with the identity provider. Default: ["email","openid","profile"]
- claim
Mappings IdentityProvider Config Oidc Identity Provider Config Claim Mappings - Defines the mappings between OpenID Connect (OIDC) claims and local claims used by your application for authentication.
- client
Id String - The client ID assigned to your application by the identity provider. Not Null
- client
Secret String - The Client Secret assigned to your application by the identity provider.
- issuer
Url String - The issuer URI of the identity provider. This is the URL where the provider's metadata can be obtained. Not Null
- scopes List<String>
- The scopes requested by your application when authenticating with the identity provider. Default: ["email","openid","profile"]
- claim
Mappings IdentityProvider Config Oidc Identity Provider Config Claim Mappings - Defines the mappings between OpenID Connect (OIDC) claims and local claims used by your application for authentication.
- client
Id string - The client ID assigned to your application by the identity provider. Not Null
- client
Secret string - The Client Secret assigned to your application by the identity provider.
- issuer
Url string - The issuer URI of the identity provider. This is the URL where the provider's metadata can be obtained. Not Null
- scopes string[]
- The scopes requested by your application when authenticating with the identity provider. Default: ["email","openid","profile"]
- claim_
mappings IdentityProvider Config Oidc Identity Provider Config Claim Mappings - Defines the mappings between OpenID Connect (OIDC) claims and local claims used by your application for authentication.
- client_
id str - The client ID assigned to your application by the identity provider. Not Null
- client_
secret str - The Client Secret assigned to your application by the identity provider.
- issuer_
url str - The issuer URI of the identity provider. This is the URL where the provider's metadata can be obtained. Not Null
- scopes Sequence[str]
- The scopes requested by your application when authenticating with the identity provider. Default: ["email","openid","profile"]
- claim
Mappings Property Map - Defines the mappings between OpenID Connect (OIDC) claims and local claims used by your application for authentication.
- client
Id String - The client ID assigned to your application by the identity provider. Not Null
- client
Secret String - The Client Secret assigned to your application by the identity provider.
- issuer
Url String - The issuer URI of the identity provider. This is the URL where the provider's metadata can be obtained. Not Null
- scopes List<String>
- The scopes requested by your application when authenticating with the identity provider. Default: ["email","openid","profile"]
IdentityProviderConfigOidcIdentityProviderConfigClaimMappings, IdentityProviderConfigOidcIdentityProviderConfigClaimMappingsArgs
IdentityProviderConfigSamlIdentityProviderConfig, IdentityProviderConfigSamlIdentityProviderConfigArgs
- Callback
Url string - The path URL where the SAML identity provider sends authentication responses after successful login attempts.
- Idp
Metadata stringUrl - The identity provider's metadata URL where the identity provider's metadata can be obtained.
- Idp
Metadata stringXml - The identity provider's SAML metadata. If the identity provider supports a metadata URL, you can use the
idp_metadata_urlfield instead. - Login
Url string - The URL to redirect users to for initiating login with the identity provider.
- Sp
Entity stringId - The entity ID of the service provider (SP).
- Sp
Metadata stringUrl
- Callback
Url string - The path URL where the SAML identity provider sends authentication responses after successful login attempts.
- Idp
Metadata stringUrl - The identity provider's metadata URL where the identity provider's metadata can be obtained.
- Idp
Metadata stringXml - The identity provider's SAML metadata. If the identity provider supports a metadata URL, you can use the
idp_metadata_urlfield instead. - Login
Url string - The URL to redirect users to for initiating login with the identity provider.
- Sp
Entity stringId - The entity ID of the service provider (SP).
- Sp
Metadata stringUrl
- callback
Url String - The path URL where the SAML identity provider sends authentication responses after successful login attempts.
- idp
Metadata StringUrl - The identity provider's metadata URL where the identity provider's metadata can be obtained.
- idp
Metadata StringXml - The identity provider's SAML metadata. If the identity provider supports a metadata URL, you can use the
idp_metadata_urlfield instead. - login
Url String - The URL to redirect users to for initiating login with the identity provider.
- sp
Entity StringId - The entity ID of the service provider (SP).
- sp
Metadata StringUrl
- callback
Url string - The path URL where the SAML identity provider sends authentication responses after successful login attempts.
- idp
Metadata stringUrl - The identity provider's metadata URL where the identity provider's metadata can be obtained.
- idp
Metadata stringXml - The identity provider's SAML metadata. If the identity provider supports a metadata URL, you can use the
idp_metadata_urlfield instead. - login
Url string - The URL to redirect users to for initiating login with the identity provider.
- sp
Entity stringId - The entity ID of the service provider (SP).
- sp
Metadata stringUrl
- callback_
url str - The path URL where the SAML identity provider sends authentication responses after successful login attempts.
- idp_
metadata_ strurl - The identity provider's metadata URL where the identity provider's metadata can be obtained.
- idp_
metadata_ strxml - The identity provider's SAML metadata. If the identity provider supports a metadata URL, you can use the
idp_metadata_urlfield instead. - login_
url str - The URL to redirect users to for initiating login with the identity provider.
- sp_
entity_ strid - The entity ID of the service provider (SP).
- sp_
metadata_ strurl
- callback
Url String - The path URL where the SAML identity provider sends authentication responses after successful login attempts.
- idp
Metadata StringUrl - The identity provider's metadata URL where the identity provider's metadata can be obtained.
- idp
Metadata StringXml - The identity provider's SAML metadata. If the identity provider supports a metadata URL, you can use the
idp_metadata_urlfield instead. - login
Url String - The URL to redirect users to for initiating login with the identity provider.
- sp
Entity StringId - The entity ID of the service provider (SP).
- sp
Metadata StringUrl
Import
In Terraform v1.5.0 and later, the import block can be used with the id attribute, for example:
terraform
import {
to = konnect_identity_provider.my_konnect_identity_provider
id = “d32d905a-ed33-46a3-a093-d8f536af9a8a”
}
The pulumi import command can be used, for example:
$ pulumi import konnect:index/identityProvider:IdentityProvider my_konnect_identity_provider "d32d905a-ed33-46a3-a093-d8f536af9a8a"
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- konnect kong/terraform-provider-konnect
- License
- Notes
- This Pulumi package is based on the
konnectTerraform Provider.
published on Thursday, Mar 12, 2026 by kong
