1. Packages
  2. Konnect Provider
  3. API Docs
  4. IdentityProvider
Viewing docs for konnect 3.11.0
published on Thursday, Mar 12, 2026 by kong
konnect logo
Viewing docs for konnect 3.11.0
published on Thursday, Mar 12, 2026 by kong

    IdentityProvider Resource

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as konnect from "@pulumi/konnect";
    
    const myIdentityprovider = new konnect.IdentityProvider("my_identityprovider", {
        config: {
            samlIdentityProviderConfig: {
                idpMetadataUrl: "https://mocksaml.com/api/saml/metadata",
                idpMetadataXml: `<?xml version="1.0" encoding="UTF-8"?>
    <EntityDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata">
      <!-- SAML metadata content here -->
    </EntityDescriptor>
    `,
            },
        },
        enabled: true,
        loginPath: "myapp",
        type: "oidc",
    });
    
    import pulumi
    import pulumi_konnect as konnect
    
    my_identityprovider = konnect.IdentityProvider("my_identityprovider",
        config={
            "saml_identity_provider_config": {
                "idp_metadata_url": "https://mocksaml.com/api/saml/metadata",
                "idp_metadata_xml": """<?xml version="1.0" encoding="UTF-8"?>
    <EntityDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata">
      <!-- SAML metadata content here -->
    </EntityDescriptor>
    """,
            },
        },
        enabled=True,
        login_path="myapp",
        type="oidc")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/konnect/v3/konnect"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := konnect.NewIdentityProvider(ctx, "my_identityprovider", &konnect.IdentityProviderArgs{
    			Config: &konnect.IdentityProviderConfigArgs{
    				SamlIdentityProviderConfig: &konnect.IdentityProviderConfigSamlIdentityProviderConfigArgs{
    					IdpMetadataUrl: pulumi.String("https://mocksaml.com/api/saml/metadata"),
    					IdpMetadataXml: pulumi.String("<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<EntityDescriptor xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\">\n  <!-- SAML metadata content here -->\n</EntityDescriptor>\n"),
    				},
    			},
    			Enabled:   pulumi.Bool(true),
    			LoginPath: pulumi.String("myapp"),
    			Type:      pulumi.String("oidc"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Konnect = Pulumi.Konnect;
    
    return await Deployment.RunAsync(() => 
    {
        var myIdentityprovider = new Konnect.IdentityProvider("my_identityprovider", new()
        {
            Config = new Konnect.Inputs.IdentityProviderConfigArgs
            {
                SamlIdentityProviderConfig = new Konnect.Inputs.IdentityProviderConfigSamlIdentityProviderConfigArgs
                {
                    IdpMetadataUrl = "https://mocksaml.com/api/saml/metadata",
                    IdpMetadataXml = @"<?xml version=""1.0"" encoding=""UTF-8""?>
    <EntityDescriptor xmlns=""urn:oasis:names:tc:SAML:2.0:metadata"">
      <!-- SAML metadata content here -->
    </EntityDescriptor>
    ",
                },
            },
            Enabled = true,
            LoginPath = "myapp",
            Type = "oidc",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.konnect.IdentityProvider;
    import com.pulumi.konnect.IdentityProviderArgs;
    import com.pulumi.konnect.inputs.IdentityProviderConfigArgs;
    import com.pulumi.konnect.inputs.IdentityProviderConfigSamlIdentityProviderConfigArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var myIdentityprovider = new IdentityProvider("myIdentityprovider", IdentityProviderArgs.builder()
                .config(IdentityProviderConfigArgs.builder()
                    .samlIdentityProviderConfig(IdentityProviderConfigSamlIdentityProviderConfigArgs.builder()
                        .idpMetadataUrl("https://mocksaml.com/api/saml/metadata")
                        .idpMetadataXml("""
    <?xml version="1.0" encoding="UTF-8"?>
    <EntityDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata">
      <!-- SAML metadata content here -->
    </EntityDescriptor>
                        """)
                        .build())
                    .build())
                .enabled(true)
                .loginPath("myapp")
                .type("oidc")
                .build());
    
        }
    }
    
    resources:
      myIdentityprovider:
        type: konnect:IdentityProvider
        name: my_identityprovider
        properties:
          config:
            samlIdentityProviderConfig:
              idpMetadataUrl: https://mocksaml.com/api/saml/metadata
              idpMetadataXml: |
                <?xml version="1.0" encoding="UTF-8"?>
                <EntityDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata">
                  <!-- SAML metadata content here -->
                </EntityDescriptor>
          enabled: true
          loginPath: myapp
          type: oidc
    

    Create IdentityProvider Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new IdentityProvider(name: string, args?: IdentityProviderArgs, opts?: CustomResourceOptions);
    @overload
    def IdentityProvider(resource_name: str,
                         args: Optional[IdentityProviderArgs] = None,
                         opts: Optional[ResourceOptions] = None)
    
    @overload
    def IdentityProvider(resource_name: str,
                         opts: Optional[ResourceOptions] = None,
                         config: Optional[IdentityProviderConfigArgs] = None,
                         enabled: Optional[bool] = None,
                         login_path: Optional[str] = None,
                         type: Optional[str] = None)
    func NewIdentityProvider(ctx *Context, name string, args *IdentityProviderArgs, opts ...ResourceOption) (*IdentityProvider, error)
    public IdentityProvider(string name, IdentityProviderArgs? args = null, CustomResourceOptions? opts = null)
    public IdentityProvider(String name, IdentityProviderArgs args)
    public IdentityProvider(String name, IdentityProviderArgs args, CustomResourceOptions options)
    
    type: konnect:IdentityProvider
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args IdentityProviderArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args IdentityProviderArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args IdentityProviderArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args IdentityProviderArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args IdentityProviderArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var identityProviderResource = new Konnect.IdentityProvider("identityProviderResource", new()
    {
        Config = new Konnect.Inputs.IdentityProviderConfigArgs
        {
            OidcIdentityProviderConfig = new Konnect.Inputs.IdentityProviderConfigOidcIdentityProviderConfigArgs
            {
                ClaimMappings = new Konnect.Inputs.IdentityProviderConfigOidcIdentityProviderConfigClaimMappingsArgs
                {
                    Email = "string",
                    Groups = "string",
                    Name = "string",
                },
                ClientId = "string",
                ClientSecret = "string",
                IssuerUrl = "string",
                Scopes = new[]
                {
                    "string",
                },
            },
            SamlIdentityProviderConfig = new Konnect.Inputs.IdentityProviderConfigSamlIdentityProviderConfigArgs
            {
                CallbackUrl = "string",
                IdpMetadataUrl = "string",
                IdpMetadataXml = "string",
                LoginUrl = "string",
                SpEntityId = "string",
                SpMetadataUrl = "string",
            },
        },
        Enabled = false,
        LoginPath = "string",
        Type = "string",
    });
    
    example, err := konnect.NewIdentityProvider(ctx, "identityProviderResource", &konnect.IdentityProviderArgs{
    	Config: &konnect.IdentityProviderConfigArgs{
    		OidcIdentityProviderConfig: &konnect.IdentityProviderConfigOidcIdentityProviderConfigArgs{
    			ClaimMappings: &konnect.IdentityProviderConfigOidcIdentityProviderConfigClaimMappingsArgs{
    				Email:  pulumi.String("string"),
    				Groups: pulumi.String("string"),
    				Name:   pulumi.String("string"),
    			},
    			ClientId:     pulumi.String("string"),
    			ClientSecret: pulumi.String("string"),
    			IssuerUrl:    pulumi.String("string"),
    			Scopes: pulumi.StringArray{
    				pulumi.String("string"),
    			},
    		},
    		SamlIdentityProviderConfig: &konnect.IdentityProviderConfigSamlIdentityProviderConfigArgs{
    			CallbackUrl:    pulumi.String("string"),
    			IdpMetadataUrl: pulumi.String("string"),
    			IdpMetadataXml: pulumi.String("string"),
    			LoginUrl:       pulumi.String("string"),
    			SpEntityId:     pulumi.String("string"),
    			SpMetadataUrl:  pulumi.String("string"),
    		},
    	},
    	Enabled:   pulumi.Bool(false),
    	LoginPath: pulumi.String("string"),
    	Type:      pulumi.String("string"),
    })
    
    var identityProviderResource = new IdentityProvider("identityProviderResource", IdentityProviderArgs.builder()
        .config(IdentityProviderConfigArgs.builder()
            .oidcIdentityProviderConfig(IdentityProviderConfigOidcIdentityProviderConfigArgs.builder()
                .claimMappings(IdentityProviderConfigOidcIdentityProviderConfigClaimMappingsArgs.builder()
                    .email("string")
                    .groups("string")
                    .name("string")
                    .build())
                .clientId("string")
                .clientSecret("string")
                .issuerUrl("string")
                .scopes("string")
                .build())
            .samlIdentityProviderConfig(IdentityProviderConfigSamlIdentityProviderConfigArgs.builder()
                .callbackUrl("string")
                .idpMetadataUrl("string")
                .idpMetadataXml("string")
                .loginUrl("string")
                .spEntityId("string")
                .spMetadataUrl("string")
                .build())
            .build())
        .enabled(false)
        .loginPath("string")
        .type("string")
        .build());
    
    identity_provider_resource = konnect.IdentityProvider("identityProviderResource",
        config={
            "oidc_identity_provider_config": {
                "claim_mappings": {
                    "email": "string",
                    "groups": "string",
                    "name": "string",
                },
                "client_id": "string",
                "client_secret": "string",
                "issuer_url": "string",
                "scopes": ["string"],
            },
            "saml_identity_provider_config": {
                "callback_url": "string",
                "idp_metadata_url": "string",
                "idp_metadata_xml": "string",
                "login_url": "string",
                "sp_entity_id": "string",
                "sp_metadata_url": "string",
            },
        },
        enabled=False,
        login_path="string",
        type="string")
    
    const identityProviderResource = new konnect.IdentityProvider("identityProviderResource", {
        config: {
            oidcIdentityProviderConfig: {
                claimMappings: {
                    email: "string",
                    groups: "string",
                    name: "string",
                },
                clientId: "string",
                clientSecret: "string",
                issuerUrl: "string",
                scopes: ["string"],
            },
            samlIdentityProviderConfig: {
                callbackUrl: "string",
                idpMetadataUrl: "string",
                idpMetadataXml: "string",
                loginUrl: "string",
                spEntityId: "string",
                spMetadataUrl: "string",
            },
        },
        enabled: false,
        loginPath: "string",
        type: "string",
    });
    
    type: konnect:IdentityProvider
    properties:
        config:
            oidcIdentityProviderConfig:
                claimMappings:
                    email: string
                    groups: string
                    name: string
                clientId: string
                clientSecret: string
                issuerUrl: string
                scopes:
                    - string
            samlIdentityProviderConfig:
                callbackUrl: string
                idpMetadataUrl: string
                idpMetadataXml: string
                loginUrl: string
                spEntityId: string
                spMetadataUrl: string
        enabled: false
        loginPath: string
        type: string
    

    IdentityProvider Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The IdentityProvider resource accepts the following input properties:

    Config IdentityProviderConfig
    Enabled bool
    Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
    LoginPath string
    The path used for initiating login requests with the identity provider.
    Type string
    Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
    Config IdentityProviderConfigArgs
    Enabled bool
    Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
    LoginPath string
    The path used for initiating login requests with the identity provider.
    Type string
    Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
    config IdentityProviderConfig
    enabled Boolean
    Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
    loginPath String
    The path used for initiating login requests with the identity provider.
    type String
    Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
    config IdentityProviderConfig
    enabled boolean
    Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
    loginPath string
    The path used for initiating login requests with the identity provider.
    type string
    Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
    config IdentityProviderConfigArgs
    enabled bool
    Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
    login_path str
    The path used for initiating login requests with the identity provider.
    type str
    Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
    config Property Map
    enabled Boolean
    Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
    loginPath String
    The path used for initiating login requests with the identity provider.
    type String
    Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the IdentityProvider resource produces the following output properties:

    CreatedAt string
    An ISO-8601 timestamp representation of entity creation date.
    Id string
    The provider-assigned unique ID for this managed resource.
    UpdatedAt string
    An ISO-8601 timestamp representation of entity update date.
    CreatedAt string
    An ISO-8601 timestamp representation of entity creation date.
    Id string
    The provider-assigned unique ID for this managed resource.
    UpdatedAt string
    An ISO-8601 timestamp representation of entity update date.
    createdAt String
    An ISO-8601 timestamp representation of entity creation date.
    id String
    The provider-assigned unique ID for this managed resource.
    updatedAt String
    An ISO-8601 timestamp representation of entity update date.
    createdAt string
    An ISO-8601 timestamp representation of entity creation date.
    id string
    The provider-assigned unique ID for this managed resource.
    updatedAt string
    An ISO-8601 timestamp representation of entity update date.
    created_at str
    An ISO-8601 timestamp representation of entity creation date.
    id str
    The provider-assigned unique ID for this managed resource.
    updated_at str
    An ISO-8601 timestamp representation of entity update date.
    createdAt String
    An ISO-8601 timestamp representation of entity creation date.
    id String
    The provider-assigned unique ID for this managed resource.
    updatedAt String
    An ISO-8601 timestamp representation of entity update date.

    Look up Existing IdentityProvider Resource

    Get an existing IdentityProvider resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: IdentityProviderState, opts?: CustomResourceOptions): IdentityProvider
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            config: Optional[IdentityProviderConfigArgs] = None,
            created_at: Optional[str] = None,
            enabled: Optional[bool] = None,
            login_path: Optional[str] = None,
            type: Optional[str] = None,
            updated_at: Optional[str] = None) -> IdentityProvider
    func GetIdentityProvider(ctx *Context, name string, id IDInput, state *IdentityProviderState, opts ...ResourceOption) (*IdentityProvider, error)
    public static IdentityProvider Get(string name, Input<string> id, IdentityProviderState? state, CustomResourceOptions? opts = null)
    public static IdentityProvider get(String name, Output<String> id, IdentityProviderState state, CustomResourceOptions options)
    resources:  _:    type: konnect:IdentityProvider    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Config IdentityProviderConfig
    CreatedAt string
    An ISO-8601 timestamp representation of entity creation date.
    Enabled bool
    Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
    LoginPath string
    The path used for initiating login requests with the identity provider.
    Type string
    Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
    UpdatedAt string
    An ISO-8601 timestamp representation of entity update date.
    Config IdentityProviderConfigArgs
    CreatedAt string
    An ISO-8601 timestamp representation of entity creation date.
    Enabled bool
    Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
    LoginPath string
    The path used for initiating login requests with the identity provider.
    Type string
    Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
    UpdatedAt string
    An ISO-8601 timestamp representation of entity update date.
    config IdentityProviderConfig
    createdAt String
    An ISO-8601 timestamp representation of entity creation date.
    enabled Boolean
    Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
    loginPath String
    The path used for initiating login requests with the identity provider.
    type String
    Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
    updatedAt String
    An ISO-8601 timestamp representation of entity update date.
    config IdentityProviderConfig
    createdAt string
    An ISO-8601 timestamp representation of entity creation date.
    enabled boolean
    Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
    loginPath string
    The path used for initiating login requests with the identity provider.
    type string
    Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
    updatedAt string
    An ISO-8601 timestamp representation of entity update date.
    config IdentityProviderConfigArgs
    created_at str
    An ISO-8601 timestamp representation of entity creation date.
    enabled bool
    Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
    login_path str
    The path used for initiating login requests with the identity provider.
    type str
    Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
    updated_at str
    An ISO-8601 timestamp representation of entity update date.
    config Property Map
    createdAt String
    An ISO-8601 timestamp representation of entity creation date.
    enabled Boolean
    Indicates whether the identity provider is enabled. Only one identity provider can be active at a time, such as SAML or OIDC. Default: false
    loginPath String
    The path used for initiating login requests with the identity provider.
    type String
    Specifies the type of identity provider. must be one of ["oidc", "saml"]; Requires replacement if changed.
    updatedAt String
    An ISO-8601 timestamp representation of entity update date.

    Supporting Types

    IdentityProviderConfig, IdentityProviderConfigArgs

    OidcIdentityProviderConfig IdentityProviderConfigOidcIdentityProviderConfig
    The identity provider that contains configuration data for the OIDC authentication integration.
    SamlIdentityProviderConfig IdentityProviderConfigSamlIdentityProviderConfig
    The identity provider that contains configuration data for the SAML authentication integration.
    OidcIdentityProviderConfig IdentityProviderConfigOidcIdentityProviderConfig
    The identity provider that contains configuration data for the OIDC authentication integration.
    SamlIdentityProviderConfig IdentityProviderConfigSamlIdentityProviderConfig
    The identity provider that contains configuration data for the SAML authentication integration.
    oidcIdentityProviderConfig IdentityProviderConfigOidcIdentityProviderConfig
    The identity provider that contains configuration data for the OIDC authentication integration.
    samlIdentityProviderConfig IdentityProviderConfigSamlIdentityProviderConfig
    The identity provider that contains configuration data for the SAML authentication integration.
    oidcIdentityProviderConfig IdentityProviderConfigOidcIdentityProviderConfig
    The identity provider that contains configuration data for the OIDC authentication integration.
    samlIdentityProviderConfig IdentityProviderConfigSamlIdentityProviderConfig
    The identity provider that contains configuration data for the SAML authentication integration.
    oidc_identity_provider_config IdentityProviderConfigOidcIdentityProviderConfig
    The identity provider that contains configuration data for the OIDC authentication integration.
    saml_identity_provider_config IdentityProviderConfigSamlIdentityProviderConfig
    The identity provider that contains configuration data for the SAML authentication integration.
    oidcIdentityProviderConfig Property Map
    The identity provider that contains configuration data for the OIDC authentication integration.
    samlIdentityProviderConfig Property Map
    The identity provider that contains configuration data for the SAML authentication integration.

    IdentityProviderConfigOidcIdentityProviderConfig, IdentityProviderConfigOidcIdentityProviderConfigArgs

    ClaimMappings IdentityProviderConfigOidcIdentityProviderConfigClaimMappings
    Defines the mappings between OpenID Connect (OIDC) claims and local claims used by your application for authentication.
    ClientId string
    The client ID assigned to your application by the identity provider. Not Null
    ClientSecret string
    The Client Secret assigned to your application by the identity provider.
    IssuerUrl string
    The issuer URI of the identity provider. This is the URL where the provider's metadata can be obtained. Not Null
    Scopes List<string>
    The scopes requested by your application when authenticating with the identity provider. Default: ["email","openid","profile"]
    ClaimMappings IdentityProviderConfigOidcIdentityProviderConfigClaimMappings
    Defines the mappings between OpenID Connect (OIDC) claims and local claims used by your application for authentication.
    ClientId string
    The client ID assigned to your application by the identity provider. Not Null
    ClientSecret string
    The Client Secret assigned to your application by the identity provider.
    IssuerUrl string
    The issuer URI of the identity provider. This is the URL where the provider's metadata can be obtained. Not Null
    Scopes []string
    The scopes requested by your application when authenticating with the identity provider. Default: ["email","openid","profile"]
    claimMappings IdentityProviderConfigOidcIdentityProviderConfigClaimMappings
    Defines the mappings between OpenID Connect (OIDC) claims and local claims used by your application for authentication.
    clientId String
    The client ID assigned to your application by the identity provider. Not Null
    clientSecret String
    The Client Secret assigned to your application by the identity provider.
    issuerUrl String
    The issuer URI of the identity provider. This is the URL where the provider's metadata can be obtained. Not Null
    scopes List<String>
    The scopes requested by your application when authenticating with the identity provider. Default: ["email","openid","profile"]
    claimMappings IdentityProviderConfigOidcIdentityProviderConfigClaimMappings
    Defines the mappings between OpenID Connect (OIDC) claims and local claims used by your application for authentication.
    clientId string
    The client ID assigned to your application by the identity provider. Not Null
    clientSecret string
    The Client Secret assigned to your application by the identity provider.
    issuerUrl string
    The issuer URI of the identity provider. This is the URL where the provider's metadata can be obtained. Not Null
    scopes string[]
    The scopes requested by your application when authenticating with the identity provider. Default: ["email","openid","profile"]
    claim_mappings IdentityProviderConfigOidcIdentityProviderConfigClaimMappings
    Defines the mappings between OpenID Connect (OIDC) claims and local claims used by your application for authentication.
    client_id str
    The client ID assigned to your application by the identity provider. Not Null
    client_secret str
    The Client Secret assigned to your application by the identity provider.
    issuer_url str
    The issuer URI of the identity provider. This is the URL where the provider's metadata can be obtained. Not Null
    scopes Sequence[str]
    The scopes requested by your application when authenticating with the identity provider. Default: ["email","openid","profile"]
    claimMappings Property Map
    Defines the mappings between OpenID Connect (OIDC) claims and local claims used by your application for authentication.
    clientId String
    The client ID assigned to your application by the identity provider. Not Null
    clientSecret String
    The Client Secret assigned to your application by the identity provider.
    issuerUrl String
    The issuer URI of the identity provider. This is the URL where the provider's metadata can be obtained. Not Null
    scopes List<String>
    The scopes requested by your application when authenticating with the identity provider. Default: ["email","openid","profile"]

    IdentityProviderConfigOidcIdentityProviderConfigClaimMappings, IdentityProviderConfigOidcIdentityProviderConfigClaimMappingsArgs

    Email string
    The claim mapping for the user's email address. Default: "email"
    Groups string
    The claim mapping for the user's group membership information. Default: "groups"
    Name string
    The claim mapping for the user's name. Default: "name"
    Email string
    The claim mapping for the user's email address. Default: "email"
    Groups string
    The claim mapping for the user's group membership information. Default: "groups"
    Name string
    The claim mapping for the user's name. Default: "name"
    email String
    The claim mapping for the user's email address. Default: "email"
    groups String
    The claim mapping for the user's group membership information. Default: "groups"
    name String
    The claim mapping for the user's name. Default: "name"
    email string
    The claim mapping for the user's email address. Default: "email"
    groups string
    The claim mapping for the user's group membership information. Default: "groups"
    name string
    The claim mapping for the user's name. Default: "name"
    email str
    The claim mapping for the user's email address. Default: "email"
    groups str
    The claim mapping for the user's group membership information. Default: "groups"
    name str
    The claim mapping for the user's name. Default: "name"
    email String
    The claim mapping for the user's email address. Default: "email"
    groups String
    The claim mapping for the user's group membership information. Default: "groups"
    name String
    The claim mapping for the user's name. Default: "name"

    IdentityProviderConfigSamlIdentityProviderConfig, IdentityProviderConfigSamlIdentityProviderConfigArgs

    CallbackUrl string
    The path URL where the SAML identity provider sends authentication responses after successful login attempts.
    IdpMetadataUrl string
    The identity provider's metadata URL where the identity provider's metadata can be obtained.
    IdpMetadataXml string
    The identity provider's SAML metadata. If the identity provider supports a metadata URL, you can use the idp_metadata_url field instead.
    LoginUrl string
    The URL to redirect users to for initiating login with the identity provider.
    SpEntityId string
    The entity ID of the service provider (SP).
    SpMetadataUrl string
    CallbackUrl string
    The path URL where the SAML identity provider sends authentication responses after successful login attempts.
    IdpMetadataUrl string
    The identity provider's metadata URL where the identity provider's metadata can be obtained.
    IdpMetadataXml string
    The identity provider's SAML metadata. If the identity provider supports a metadata URL, you can use the idp_metadata_url field instead.
    LoginUrl string
    The URL to redirect users to for initiating login with the identity provider.
    SpEntityId string
    The entity ID of the service provider (SP).
    SpMetadataUrl string
    callbackUrl String
    The path URL where the SAML identity provider sends authentication responses after successful login attempts.
    idpMetadataUrl String
    The identity provider's metadata URL where the identity provider's metadata can be obtained.
    idpMetadataXml String
    The identity provider's SAML metadata. If the identity provider supports a metadata URL, you can use the idp_metadata_url field instead.
    loginUrl String
    The URL to redirect users to for initiating login with the identity provider.
    spEntityId String
    The entity ID of the service provider (SP).
    spMetadataUrl String
    callbackUrl string
    The path URL where the SAML identity provider sends authentication responses after successful login attempts.
    idpMetadataUrl string
    The identity provider's metadata URL where the identity provider's metadata can be obtained.
    idpMetadataXml string
    The identity provider's SAML metadata. If the identity provider supports a metadata URL, you can use the idp_metadata_url field instead.
    loginUrl string
    The URL to redirect users to for initiating login with the identity provider.
    spEntityId string
    The entity ID of the service provider (SP).
    spMetadataUrl string
    callback_url str
    The path URL where the SAML identity provider sends authentication responses after successful login attempts.
    idp_metadata_url str
    The identity provider's metadata URL where the identity provider's metadata can be obtained.
    idp_metadata_xml str
    The identity provider's SAML metadata. If the identity provider supports a metadata URL, you can use the idp_metadata_url field instead.
    login_url str
    The URL to redirect users to for initiating login with the identity provider.
    sp_entity_id str
    The entity ID of the service provider (SP).
    sp_metadata_url str
    callbackUrl String
    The path URL where the SAML identity provider sends authentication responses after successful login attempts.
    idpMetadataUrl String
    The identity provider's metadata URL where the identity provider's metadata can be obtained.
    idpMetadataXml String
    The identity provider's SAML metadata. If the identity provider supports a metadata URL, you can use the idp_metadata_url field instead.
    loginUrl String
    The URL to redirect users to for initiating login with the identity provider.
    spEntityId String
    The entity ID of the service provider (SP).
    spMetadataUrl String

    Import

    In Terraform v1.5.0 and later, the import block can be used with the id attribute, for example:

    terraform

    import {

    to = konnect_identity_provider.my_konnect_identity_provider

    id = “d32d905a-ed33-46a3-a093-d8f536af9a8a”

    }

    The pulumi import command can be used, for example:

    $ pulumi import konnect:index/identityProvider:IdentityProvider my_konnect_identity_provider "d32d905a-ed33-46a3-a093-d8f536af9a8a"
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    konnect kong/terraform-provider-konnect
    License
    Notes
    This Pulumi package is based on the konnect Terraform Provider.
    konnect logo
    Viewing docs for konnect 3.11.0
    published on Thursday, Mar 12, 2026 by kong
      Try Pulumi Cloud free. Your team will thank you.