1. Packages
  2. Sysdig Provider
  3. API Docs
  4. SsoSaml
Viewing docs for sysdig 3.5.0
published on Friday, Mar 6, 2026 by sysdiglabs
sysdig logo
Viewing docs for sysdig 3.5.0
published on Friday, Mar 6, 2026 by sysdiglabs

    Example Usage

    Basic example with metadata URL

    import * as pulumi from "@pulumi/pulumi";
    import * as sysdig from "@pulumi/sysdig";
    
    const example = new sysdig.SsoSaml("example", {
        metadataUrl: "https://idp.example.com/app/sysdig/sso/saml/metadata",
        emailParameter: "email",
        integrationName: "Corporate SAML SSO",
        isActive: true,
        isSystem: false,
    });
    
    import pulumi
    import pulumi_sysdig as sysdig
    
    example = sysdig.SsoSaml("example",
        metadata_url="https://idp.example.com/app/sysdig/sso/saml/metadata",
        email_parameter="email",
        integration_name="Corporate SAML SSO",
        is_active=True,
        is_system=False)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := sysdig.NewSsoSaml(ctx, "example", &sysdig.SsoSamlArgs{
    			MetadataUrl:     pulumi.String("https://idp.example.com/app/sysdig/sso/saml/metadata"),
    			EmailParameter:  pulumi.String("email"),
    			IntegrationName: pulumi.String("Corporate SAML SSO"),
    			IsActive:        pulumi.Bool(true),
    			IsSystem:        pulumi.Bool(false),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Sysdig = Pulumi.Sysdig;
    
    return await Deployment.RunAsync(() => 
    {
        var example = new Sysdig.SsoSaml("example", new()
        {
            MetadataUrl = "https://idp.example.com/app/sysdig/sso/saml/metadata",
            EmailParameter = "email",
            IntegrationName = "Corporate SAML SSO",
            IsActive = true,
            IsSystem = false,
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.sysdig.SsoSaml;
    import com.pulumi.sysdig.SsoSamlArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new SsoSaml("example", SsoSamlArgs.builder()
                .metadataUrl("https://idp.example.com/app/sysdig/sso/saml/metadata")
                .emailParameter("email")
                .integrationName("Corporate SAML SSO")
                .isActive(true)
                .isSystem(false)
                .build());
    
        }
    }
    
    resources:
      example:
        type: sysdig:SsoSaml
        properties:
          metadataUrl: https://idp.example.com/app/sysdig/sso/saml/metadata
          emailParameter: email
          integrationName: Corporate SAML SSO
          isActive: true
          isSystem: false
    

    Example with inline metadata XML

    import * as pulumi from "@pulumi/pulumi";
    import * as sysdig from "@pulumi/sysdig";
    
    const exampleXml = new sysdig.SsoSaml("example_xml", {
        metadataXml: `<?xml version=\\"1.0\\" encoding=\\"UTF-8\\"?>
    <EntityDescriptor xmlns=\\"urn:oasis:names:tc:SAML:2.0:metadata\\" entityID=\\"https://idp.example.com\\">
      <IDPSSODescriptor protocolSupportEnumeration=\\"urn:oasis:names:tc:SAML:2.0:protocol\\">
        <SingleSignOnService Binding=\\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\\" Location=\\"https://idp.example.com/sso\\"/>
      </IDPSSODescriptor>
    </EntityDescriptor>
    `,
        emailParameter: "email",
        integrationName: "Corporate SAML SSO",
        isActive: true,
        isSystem: false,
    });
    
    import pulumi
    import pulumi_sysdig as sysdig
    
    example_xml = sysdig.SsoSaml("example_xml",
        metadata_xml="""<?xml version=\"1.0\" encoding=\"UTF-8\"?>
    <EntityDescriptor xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" entityID=\"https://idp.example.com\">
      <IDPSSODescriptor protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">
        <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idp.example.com/sso\"/>
      </IDPSSODescriptor>
    </EntityDescriptor>
    """,
        email_parameter="email",
        integration_name="Corporate SAML SSO",
        is_active=True,
        is_system=False)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := sysdig.NewSsoSaml(ctx, "example_xml", &sysdig.SsoSamlArgs{
    			MetadataXml: pulumi.String(`<?xml version=\"1.0\" encoding=\"UTF-8\"?>
    <EntityDescriptor xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" entityID=\"https://idp.example.com\">
      <IDPSSODescriptor protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">
        <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idp.example.com/sso\"/>
      </IDPSSODescriptor>
    </EntityDescriptor>
    `),
    			EmailParameter:  pulumi.String("email"),
    			IntegrationName: pulumi.String("Corporate SAML SSO"),
    			IsActive:        pulumi.Bool(true),
    			IsSystem:        pulumi.Bool(false),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Sysdig = Pulumi.Sysdig;
    
    return await Deployment.RunAsync(() => 
    {
        var exampleXml = new Sysdig.SsoSaml("example_xml", new()
        {
            MetadataXml = @"<?xml version=\""1.0\"" encoding=\""UTF-8\""?>
    <EntityDescriptor xmlns=\""urn:oasis:names:tc:SAML:2.0:metadata\"" entityID=\""https://idp.example.com\"">
      <IDPSSODescriptor protocolSupportEnumeration=\""urn:oasis:names:tc:SAML:2.0:protocol\"">
        <SingleSignOnService Binding=\""urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\"" Location=\""https://idp.example.com/sso\""/>
      </IDPSSODescriptor>
    </EntityDescriptor>
    ",
            EmailParameter = "email",
            IntegrationName = "Corporate SAML SSO",
            IsActive = true,
            IsSystem = false,
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.sysdig.SsoSaml;
    import com.pulumi.sysdig.SsoSamlArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var exampleXml = new SsoSaml("exampleXml", SsoSamlArgs.builder()
                .metadataXml("""
    <?xml version=\"1.0\" encoding=\"UTF-8\"?>
    <EntityDescriptor xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" entityID=\"https://idp.example.com\">
      <IDPSSODescriptor protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">
        <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idp.example.com/sso\"/>
      </IDPSSODescriptor>
    </EntityDescriptor>
                """)
                .emailParameter("email")
                .integrationName("Corporate SAML SSO")
                .isActive(true)
                .isSystem(false)
                .build());
    
        }
    }
    
    resources:
      exampleXml:
        type: sysdig:SsoSaml
        name: example_xml
        properties:
          metadataXml: |
            <?xml version=\"1.0\" encoding=\"UTF-8\"?>
            <EntityDescriptor xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" entityID=\"https://idp.example.com\">
              <IDPSSODescriptor protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">
                <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idp.example.com/sso\"/>
              </IDPSSODescriptor>
            </EntityDescriptor>
          emailParameter: email
          integrationName: Corporate SAML SSO
          isActive: true
          isSystem: false
    

    Example with group mapping enabled

    import * as pulumi from "@pulumi/pulumi";
    import * as sysdig from "@pulumi/sysdig";
    
    const exampleGroups = new sysdig.SsoSaml("example_groups", {
        metadataUrl: "https://idp.example.com/app/sysdig/sso/saml/metadata",
        emailParameter: "email",
        integrationName: "Corporate SAML SSO",
        isActive: true,
        isSystem: false,
        isGroupMappingEnabled: true,
        groupMappingAttributeName: "groups",
    });
    
    import pulumi
    import pulumi_sysdig as sysdig
    
    example_groups = sysdig.SsoSaml("example_groups",
        metadata_url="https://idp.example.com/app/sysdig/sso/saml/metadata",
        email_parameter="email",
        integration_name="Corporate SAML SSO",
        is_active=True,
        is_system=False,
        is_group_mapping_enabled=True,
        group_mapping_attribute_name="groups")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := sysdig.NewSsoSaml(ctx, "example_groups", &sysdig.SsoSamlArgs{
    			MetadataUrl:               pulumi.String("https://idp.example.com/app/sysdig/sso/saml/metadata"),
    			EmailParameter:            pulumi.String("email"),
    			IntegrationName:           pulumi.String("Corporate SAML SSO"),
    			IsActive:                  pulumi.Bool(true),
    			IsSystem:                  pulumi.Bool(false),
    			IsGroupMappingEnabled:     pulumi.Bool(true),
    			GroupMappingAttributeName: pulumi.String("groups"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Sysdig = Pulumi.Sysdig;
    
    return await Deployment.RunAsync(() => 
    {
        var exampleGroups = new Sysdig.SsoSaml("example_groups", new()
        {
            MetadataUrl = "https://idp.example.com/app/sysdig/sso/saml/metadata",
            EmailParameter = "email",
            IntegrationName = "Corporate SAML SSO",
            IsActive = true,
            IsSystem = false,
            IsGroupMappingEnabled = true,
            GroupMappingAttributeName = "groups",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.sysdig.SsoSaml;
    import com.pulumi.sysdig.SsoSamlArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var exampleGroups = new SsoSaml("exampleGroups", SsoSamlArgs.builder()
                .metadataUrl("https://idp.example.com/app/sysdig/sso/saml/metadata")
                .emailParameter("email")
                .integrationName("Corporate SAML SSO")
                .isActive(true)
                .isSystem(false)
                .isGroupMappingEnabled(true)
                .groupMappingAttributeName("groups")
                .build());
    
        }
    }
    
    resources:
      exampleGroups:
        type: sysdig:SsoSaml
        name: example_groups
        properties:
          metadataUrl: https://idp.example.com/app/sysdig/sso/saml/metadata
          emailParameter: email
          integrationName: Corporate SAML SSO
          isActive: true
          isSystem: false
          isGroupMappingEnabled: true
          groupMappingAttributeName: groups
    

    Example with custom security settings

    import * as pulumi from "@pulumi/pulumi";
    import * as sysdig from "@pulumi/sysdig";
    
    const exampleSecurity = new sysdig.SsoSaml("example_security", {
        metadataUrl: "https://idp.example.com/app/sysdig/sso/saml/metadata",
        emailParameter: "email",
        integrationName: "Corporate SAML SSO",
        isActive: true,
        isSignatureValidationEnabled: true,
        isSignedAssertionEnabled: true,
        isDestinationVerificationEnabled: true,
        isEncryptionSupportEnabled: false,
    });
    
    import pulumi
    import pulumi_sysdig as sysdig
    
    example_security = sysdig.SsoSaml("example_security",
        metadata_url="https://idp.example.com/app/sysdig/sso/saml/metadata",
        email_parameter="email",
        integration_name="Corporate SAML SSO",
        is_active=True,
        is_signature_validation_enabled=True,
        is_signed_assertion_enabled=True,
        is_destination_verification_enabled=True,
        is_encryption_support_enabled=False)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := sysdig.NewSsoSaml(ctx, "example_security", &sysdig.SsoSamlArgs{
    			MetadataUrl:                      pulumi.String("https://idp.example.com/app/sysdig/sso/saml/metadata"),
    			EmailParameter:                   pulumi.String("email"),
    			IntegrationName:                  pulumi.String("Corporate SAML SSO"),
    			IsActive:                         pulumi.Bool(true),
    			IsSignatureValidationEnabled:     pulumi.Bool(true),
    			IsSignedAssertionEnabled:         pulumi.Bool(true),
    			IsDestinationVerificationEnabled: pulumi.Bool(true),
    			IsEncryptionSupportEnabled:       pulumi.Bool(false),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Sysdig = Pulumi.Sysdig;
    
    return await Deployment.RunAsync(() => 
    {
        var exampleSecurity = new Sysdig.SsoSaml("example_security", new()
        {
            MetadataUrl = "https://idp.example.com/app/sysdig/sso/saml/metadata",
            EmailParameter = "email",
            IntegrationName = "Corporate SAML SSO",
            IsActive = true,
            IsSignatureValidationEnabled = true,
            IsSignedAssertionEnabled = true,
            IsDestinationVerificationEnabled = true,
            IsEncryptionSupportEnabled = false,
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.sysdig.SsoSaml;
    import com.pulumi.sysdig.SsoSamlArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var exampleSecurity = new SsoSaml("exampleSecurity", SsoSamlArgs.builder()
                .metadataUrl("https://idp.example.com/app/sysdig/sso/saml/metadata")
                .emailParameter("email")
                .integrationName("Corporate SAML SSO")
                .isActive(true)
                .isSignatureValidationEnabled(true)
                .isSignedAssertionEnabled(true)
                .isDestinationVerificationEnabled(true)
                .isEncryptionSupportEnabled(false)
                .build());
    
        }
    }
    
    resources:
      exampleSecurity:
        type: sysdig:SsoSaml
        name: example_security
        properties:
          metadataUrl: https://idp.example.com/app/sysdig/sso/saml/metadata
          emailParameter: email
          integrationName: Corporate SAML SSO
          isActive: true
          isSignatureValidationEnabled: true
          isSignedAssertionEnabled: true
          isDestinationVerificationEnabled: true
          isEncryptionSupportEnabled: false
    

    Create SsoSaml Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new SsoSaml(name: string, args: SsoSamlArgs, opts?: CustomResourceOptions);
    @overload
    def SsoSaml(resource_name: str,
                args: SsoSamlArgs,
                opts: Optional[ResourceOptions] = None)
    
    @overload
    def SsoSaml(resource_name: str,
                opts: Optional[ResourceOptions] = None,
                email_parameter: Optional[str] = None,
                is_signature_validation_enabled: Optional[bool] = None,
                is_single_logout_enabled: Optional[bool] = None,
                integration_name: Optional[str] = None,
                is_active: Optional[bool] = None,
                is_destination_verification_enabled: Optional[bool] = None,
                is_encryption_support_enabled: Optional[bool] = None,
                group_mapping_attribute_name: Optional[str] = None,
                is_group_mapping_enabled: Optional[bool] = None,
                is_signed_assertion_enabled: Optional[bool] = None,
                create_user_on_login: Optional[bool] = None,
                is_system: Optional[bool] = None,
                metadata_url: Optional[str] = None,
                metadata_xml: Optional[str] = None,
                product: Optional[str] = None,
                sso_saml_id: Optional[str] = None,
                timeouts: Optional[SsoSamlTimeoutsArgs] = None)
    func NewSsoSaml(ctx *Context, name string, args SsoSamlArgs, opts ...ResourceOption) (*SsoSaml, error)
    public SsoSaml(string name, SsoSamlArgs args, CustomResourceOptions? opts = null)
    public SsoSaml(String name, SsoSamlArgs args)
    public SsoSaml(String name, SsoSamlArgs args, CustomResourceOptions options)
    
    type: sysdig:SsoSaml
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args SsoSamlArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args SsoSamlArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args SsoSamlArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args SsoSamlArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args SsoSamlArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var ssoSamlResource = new Sysdig.SsoSaml("ssoSamlResource", new()
    {
        EmailParameter = "string",
        IsSignatureValidationEnabled = false,
        IsSingleLogoutEnabled = false,
        IntegrationName = "string",
        IsActive = false,
        IsDestinationVerificationEnabled = false,
        IsEncryptionSupportEnabled = false,
        GroupMappingAttributeName = "string",
        IsGroupMappingEnabled = false,
        IsSignedAssertionEnabled = false,
        CreateUserOnLogin = false,
        IsSystem = false,
        MetadataUrl = "string",
        MetadataXml = "string",
        Product = "string",
        SsoSamlId = "string",
        Timeouts = new Sysdig.Inputs.SsoSamlTimeoutsArgs
        {
            Create = "string",
            Delete = "string",
            Read = "string",
            Update = "string",
        },
    });
    
    example, err := sysdig.NewSsoSaml(ctx, "ssoSamlResource", &sysdig.SsoSamlArgs{
    	EmailParameter:                   pulumi.String("string"),
    	IsSignatureValidationEnabled:     pulumi.Bool(false),
    	IsSingleLogoutEnabled:            pulumi.Bool(false),
    	IntegrationName:                  pulumi.String("string"),
    	IsActive:                         pulumi.Bool(false),
    	IsDestinationVerificationEnabled: pulumi.Bool(false),
    	IsEncryptionSupportEnabled:       pulumi.Bool(false),
    	GroupMappingAttributeName:        pulumi.String("string"),
    	IsGroupMappingEnabled:            pulumi.Bool(false),
    	IsSignedAssertionEnabled:         pulumi.Bool(false),
    	CreateUserOnLogin:                pulumi.Bool(false),
    	IsSystem:                         pulumi.Bool(false),
    	MetadataUrl:                      pulumi.String("string"),
    	MetadataXml:                      pulumi.String("string"),
    	Product:                          pulumi.String("string"),
    	SsoSamlId:                        pulumi.String("string"),
    	Timeouts: &sysdig.SsoSamlTimeoutsArgs{
    		Create: pulumi.String("string"),
    		Delete: pulumi.String("string"),
    		Read:   pulumi.String("string"),
    		Update: pulumi.String("string"),
    	},
    })
    
    var ssoSamlResource = new SsoSaml("ssoSamlResource", SsoSamlArgs.builder()
        .emailParameter("string")
        .isSignatureValidationEnabled(false)
        .isSingleLogoutEnabled(false)
        .integrationName("string")
        .isActive(false)
        .isDestinationVerificationEnabled(false)
        .isEncryptionSupportEnabled(false)
        .groupMappingAttributeName("string")
        .isGroupMappingEnabled(false)
        .isSignedAssertionEnabled(false)
        .createUserOnLogin(false)
        .isSystem(false)
        .metadataUrl("string")
        .metadataXml("string")
        .product("string")
        .ssoSamlId("string")
        .timeouts(SsoSamlTimeoutsArgs.builder()
            .create("string")
            .delete("string")
            .read("string")
            .update("string")
            .build())
        .build());
    
    sso_saml_resource = sysdig.SsoSaml("ssoSamlResource",
        email_parameter="string",
        is_signature_validation_enabled=False,
        is_single_logout_enabled=False,
        integration_name="string",
        is_active=False,
        is_destination_verification_enabled=False,
        is_encryption_support_enabled=False,
        group_mapping_attribute_name="string",
        is_group_mapping_enabled=False,
        is_signed_assertion_enabled=False,
        create_user_on_login=False,
        is_system=False,
        metadata_url="string",
        metadata_xml="string",
        product="string",
        sso_saml_id="string",
        timeouts={
            "create": "string",
            "delete": "string",
            "read": "string",
            "update": "string",
        })
    
    const ssoSamlResource = new sysdig.SsoSaml("ssoSamlResource", {
        emailParameter: "string",
        isSignatureValidationEnabled: false,
        isSingleLogoutEnabled: false,
        integrationName: "string",
        isActive: false,
        isDestinationVerificationEnabled: false,
        isEncryptionSupportEnabled: false,
        groupMappingAttributeName: "string",
        isGroupMappingEnabled: false,
        isSignedAssertionEnabled: false,
        createUserOnLogin: false,
        isSystem: false,
        metadataUrl: "string",
        metadataXml: "string",
        product: "string",
        ssoSamlId: "string",
        timeouts: {
            create: "string",
            "delete": "string",
            read: "string",
            update: "string",
        },
    });
    
    type: sysdig:SsoSaml
    properties:
        createUserOnLogin: false
        emailParameter: string
        groupMappingAttributeName: string
        integrationName: string
        isActive: false
        isDestinationVerificationEnabled: false
        isEncryptionSupportEnabled: false
        isGroupMappingEnabled: false
        isSignatureValidationEnabled: false
        isSignedAssertionEnabled: false
        isSingleLogoutEnabled: false
        isSystem: false
        metadataUrl: string
        metadataXml: string
        product: string
        ssoSamlId: string
        timeouts:
            create: string
            delete: string
            read: string
            update: string
    

    SsoSaml Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The SsoSaml resource accepts the following input properties:

    EmailParameter string
    The SAML attribute name that contains the user's email address
    CreateUserOnLogin bool
    Whether to create a new user upon first login
    GroupMappingAttributeName string
    The SAML attribute name for group mapping
    IntegrationName string
    A name to distinguish different SSO integrations (cannot be changed after creation)
    IsActive bool
    Whether the SSO configuration is active
    IsDestinationVerificationEnabled bool
    Whether destination verification is enabled
    IsEncryptionSupportEnabled bool
    Whether encryption support is enabled
    IsGroupMappingEnabled bool
    Whether group mapping is enabled
    IsSignatureValidationEnabled bool
    Whether SAML response signature validation is enabled
    IsSignedAssertionEnabled bool
    Whether signed SAML assertions are required
    IsSingleLogoutEnabled bool
    Whether single logout is enabled
    IsSystem bool
    Whether this is a system SSO configuration (Only applicable to on-prem installations)
    MetadataUrl string
    The URL to fetch SAML metadata from the IdP
    MetadataXml string
    The raw SAML metadata XML from the IdP
    Product string
    The Sysdig product (monitor or secure)
    SsoSamlId string
    Timeouts SsoSamlTimeouts
    EmailParameter string
    The SAML attribute name that contains the user's email address
    CreateUserOnLogin bool
    Whether to create a new user upon first login
    GroupMappingAttributeName string
    The SAML attribute name for group mapping
    IntegrationName string
    A name to distinguish different SSO integrations (cannot be changed after creation)
    IsActive bool
    Whether the SSO configuration is active
    IsDestinationVerificationEnabled bool
    Whether destination verification is enabled
    IsEncryptionSupportEnabled bool
    Whether encryption support is enabled
    IsGroupMappingEnabled bool
    Whether group mapping is enabled
    IsSignatureValidationEnabled bool
    Whether SAML response signature validation is enabled
    IsSignedAssertionEnabled bool
    Whether signed SAML assertions are required
    IsSingleLogoutEnabled bool
    Whether single logout is enabled
    IsSystem bool
    Whether this is a system SSO configuration (Only applicable to on-prem installations)
    MetadataUrl string
    The URL to fetch SAML metadata from the IdP
    MetadataXml string
    The raw SAML metadata XML from the IdP
    Product string
    The Sysdig product (monitor or secure)
    SsoSamlId string
    Timeouts SsoSamlTimeoutsArgs
    emailParameter String
    The SAML attribute name that contains the user's email address
    createUserOnLogin Boolean
    Whether to create a new user upon first login
    groupMappingAttributeName String
    The SAML attribute name for group mapping
    integrationName String
    A name to distinguish different SSO integrations (cannot be changed after creation)
    isActive Boolean
    Whether the SSO configuration is active
    isDestinationVerificationEnabled Boolean
    Whether destination verification is enabled
    isEncryptionSupportEnabled Boolean
    Whether encryption support is enabled
    isGroupMappingEnabled Boolean
    Whether group mapping is enabled
    isSignatureValidationEnabled Boolean
    Whether SAML response signature validation is enabled
    isSignedAssertionEnabled Boolean
    Whether signed SAML assertions are required
    isSingleLogoutEnabled Boolean
    Whether single logout is enabled
    isSystem Boolean
    Whether this is a system SSO configuration (Only applicable to on-prem installations)
    metadataUrl String
    The URL to fetch SAML metadata from the IdP
    metadataXml String
    The raw SAML metadata XML from the IdP
    product String
    The Sysdig product (monitor or secure)
    ssoSamlId String
    timeouts SsoSamlTimeouts
    emailParameter string
    The SAML attribute name that contains the user's email address
    createUserOnLogin boolean
    Whether to create a new user upon first login
    groupMappingAttributeName string
    The SAML attribute name for group mapping
    integrationName string
    A name to distinguish different SSO integrations (cannot be changed after creation)
    isActive boolean
    Whether the SSO configuration is active
    isDestinationVerificationEnabled boolean
    Whether destination verification is enabled
    isEncryptionSupportEnabled boolean
    Whether encryption support is enabled
    isGroupMappingEnabled boolean
    Whether group mapping is enabled
    isSignatureValidationEnabled boolean
    Whether SAML response signature validation is enabled
    isSignedAssertionEnabled boolean
    Whether signed SAML assertions are required
    isSingleLogoutEnabled boolean
    Whether single logout is enabled
    isSystem boolean
    Whether this is a system SSO configuration (Only applicable to on-prem installations)
    metadataUrl string
    The URL to fetch SAML metadata from the IdP
    metadataXml string
    The raw SAML metadata XML from the IdP
    product string
    The Sysdig product (monitor or secure)
    ssoSamlId string
    timeouts SsoSamlTimeouts
    email_parameter str
    The SAML attribute name that contains the user's email address
    create_user_on_login bool
    Whether to create a new user upon first login
    group_mapping_attribute_name str
    The SAML attribute name for group mapping
    integration_name str
    A name to distinguish different SSO integrations (cannot be changed after creation)
    is_active bool
    Whether the SSO configuration is active
    is_destination_verification_enabled bool
    Whether destination verification is enabled
    is_encryption_support_enabled bool
    Whether encryption support is enabled
    is_group_mapping_enabled bool
    Whether group mapping is enabled
    is_signature_validation_enabled bool
    Whether SAML response signature validation is enabled
    is_signed_assertion_enabled bool
    Whether signed SAML assertions are required
    is_single_logout_enabled bool
    Whether single logout is enabled
    is_system bool
    Whether this is a system SSO configuration (Only applicable to on-prem installations)
    metadata_url str
    The URL to fetch SAML metadata from the IdP
    metadata_xml str
    The raw SAML metadata XML from the IdP
    product str
    The Sysdig product (monitor or secure)
    sso_saml_id str
    timeouts SsoSamlTimeoutsArgs
    emailParameter String
    The SAML attribute name that contains the user's email address
    createUserOnLogin Boolean
    Whether to create a new user upon first login
    groupMappingAttributeName String
    The SAML attribute name for group mapping
    integrationName String
    A name to distinguish different SSO integrations (cannot be changed after creation)
    isActive Boolean
    Whether the SSO configuration is active
    isDestinationVerificationEnabled Boolean
    Whether destination verification is enabled
    isEncryptionSupportEnabled Boolean
    Whether encryption support is enabled
    isGroupMappingEnabled Boolean
    Whether group mapping is enabled
    isSignatureValidationEnabled Boolean
    Whether SAML response signature validation is enabled
    isSignedAssertionEnabled Boolean
    Whether signed SAML assertions are required
    isSingleLogoutEnabled Boolean
    Whether single logout is enabled
    isSystem Boolean
    Whether this is a system SSO configuration (Only applicable to on-prem installations)
    metadataUrl String
    The URL to fetch SAML metadata from the IdP
    metadataXml String
    The raw SAML metadata XML from the IdP
    product String
    The Sysdig product (monitor or secure)
    ssoSamlId String
    timeouts Property Map

    Outputs

    All input properties are implicitly available as output properties. Additionally, the SsoSaml resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Version double
    The version of the SSO configuration, used for optimistic locking during updates.
    Id string
    The provider-assigned unique ID for this managed resource.
    Version float64
    The version of the SSO configuration, used for optimistic locking during updates.
    id String
    The provider-assigned unique ID for this managed resource.
    version Double
    The version of the SSO configuration, used for optimistic locking during updates.
    id string
    The provider-assigned unique ID for this managed resource.
    version number
    The version of the SSO configuration, used for optimistic locking during updates.
    id str
    The provider-assigned unique ID for this managed resource.
    version float
    The version of the SSO configuration, used for optimistic locking during updates.
    id String
    The provider-assigned unique ID for this managed resource.
    version Number
    The version of the SSO configuration, used for optimistic locking during updates.

    Look up Existing SsoSaml Resource

    Get an existing SsoSaml resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: SsoSamlState, opts?: CustomResourceOptions): SsoSaml
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            create_user_on_login: Optional[bool] = None,
            email_parameter: Optional[str] = None,
            group_mapping_attribute_name: Optional[str] = None,
            integration_name: Optional[str] = None,
            is_active: Optional[bool] = None,
            is_destination_verification_enabled: Optional[bool] = None,
            is_encryption_support_enabled: Optional[bool] = None,
            is_group_mapping_enabled: Optional[bool] = None,
            is_signature_validation_enabled: Optional[bool] = None,
            is_signed_assertion_enabled: Optional[bool] = None,
            is_single_logout_enabled: Optional[bool] = None,
            is_system: Optional[bool] = None,
            metadata_url: Optional[str] = None,
            metadata_xml: Optional[str] = None,
            product: Optional[str] = None,
            sso_saml_id: Optional[str] = None,
            timeouts: Optional[SsoSamlTimeoutsArgs] = None,
            version: Optional[float] = None) -> SsoSaml
    func GetSsoSaml(ctx *Context, name string, id IDInput, state *SsoSamlState, opts ...ResourceOption) (*SsoSaml, error)
    public static SsoSaml Get(string name, Input<string> id, SsoSamlState? state, CustomResourceOptions? opts = null)
    public static SsoSaml get(String name, Output<String> id, SsoSamlState state, CustomResourceOptions options)
    resources:  _:    type: sysdig:SsoSaml    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    CreateUserOnLogin bool
    Whether to create a new user upon first login
    EmailParameter string
    The SAML attribute name that contains the user's email address
    GroupMappingAttributeName string
    The SAML attribute name for group mapping
    IntegrationName string
    A name to distinguish different SSO integrations (cannot be changed after creation)
    IsActive bool
    Whether the SSO configuration is active
    IsDestinationVerificationEnabled bool
    Whether destination verification is enabled
    IsEncryptionSupportEnabled bool
    Whether encryption support is enabled
    IsGroupMappingEnabled bool
    Whether group mapping is enabled
    IsSignatureValidationEnabled bool
    Whether SAML response signature validation is enabled
    IsSignedAssertionEnabled bool
    Whether signed SAML assertions are required
    IsSingleLogoutEnabled bool
    Whether single logout is enabled
    IsSystem bool
    Whether this is a system SSO configuration (Only applicable to on-prem installations)
    MetadataUrl string
    The URL to fetch SAML metadata from the IdP
    MetadataXml string
    The raw SAML metadata XML from the IdP
    Product string
    The Sysdig product (monitor or secure)
    SsoSamlId string
    Timeouts SsoSamlTimeouts
    Version double
    The version of the SSO configuration, used for optimistic locking during updates.
    CreateUserOnLogin bool
    Whether to create a new user upon first login
    EmailParameter string
    The SAML attribute name that contains the user's email address
    GroupMappingAttributeName string
    The SAML attribute name for group mapping
    IntegrationName string
    A name to distinguish different SSO integrations (cannot be changed after creation)
    IsActive bool
    Whether the SSO configuration is active
    IsDestinationVerificationEnabled bool
    Whether destination verification is enabled
    IsEncryptionSupportEnabled bool
    Whether encryption support is enabled
    IsGroupMappingEnabled bool
    Whether group mapping is enabled
    IsSignatureValidationEnabled bool
    Whether SAML response signature validation is enabled
    IsSignedAssertionEnabled bool
    Whether signed SAML assertions are required
    IsSingleLogoutEnabled bool
    Whether single logout is enabled
    IsSystem bool
    Whether this is a system SSO configuration (Only applicable to on-prem installations)
    MetadataUrl string
    The URL to fetch SAML metadata from the IdP
    MetadataXml string
    The raw SAML metadata XML from the IdP
    Product string
    The Sysdig product (monitor or secure)
    SsoSamlId string
    Timeouts SsoSamlTimeoutsArgs
    Version float64
    The version of the SSO configuration, used for optimistic locking during updates.
    createUserOnLogin Boolean
    Whether to create a new user upon first login
    emailParameter String
    The SAML attribute name that contains the user's email address
    groupMappingAttributeName String
    The SAML attribute name for group mapping
    integrationName String
    A name to distinguish different SSO integrations (cannot be changed after creation)
    isActive Boolean
    Whether the SSO configuration is active
    isDestinationVerificationEnabled Boolean
    Whether destination verification is enabled
    isEncryptionSupportEnabled Boolean
    Whether encryption support is enabled
    isGroupMappingEnabled Boolean
    Whether group mapping is enabled
    isSignatureValidationEnabled Boolean
    Whether SAML response signature validation is enabled
    isSignedAssertionEnabled Boolean
    Whether signed SAML assertions are required
    isSingleLogoutEnabled Boolean
    Whether single logout is enabled
    isSystem Boolean
    Whether this is a system SSO configuration (Only applicable to on-prem installations)
    metadataUrl String
    The URL to fetch SAML metadata from the IdP
    metadataXml String
    The raw SAML metadata XML from the IdP
    product String
    The Sysdig product (monitor or secure)
    ssoSamlId String
    timeouts SsoSamlTimeouts
    version Double
    The version of the SSO configuration, used for optimistic locking during updates.
    createUserOnLogin boolean
    Whether to create a new user upon first login
    emailParameter string
    The SAML attribute name that contains the user's email address
    groupMappingAttributeName string
    The SAML attribute name for group mapping
    integrationName string
    A name to distinguish different SSO integrations (cannot be changed after creation)
    isActive boolean
    Whether the SSO configuration is active
    isDestinationVerificationEnabled boolean
    Whether destination verification is enabled
    isEncryptionSupportEnabled boolean
    Whether encryption support is enabled
    isGroupMappingEnabled boolean
    Whether group mapping is enabled
    isSignatureValidationEnabled boolean
    Whether SAML response signature validation is enabled
    isSignedAssertionEnabled boolean
    Whether signed SAML assertions are required
    isSingleLogoutEnabled boolean
    Whether single logout is enabled
    isSystem boolean
    Whether this is a system SSO configuration (Only applicable to on-prem installations)
    metadataUrl string
    The URL to fetch SAML metadata from the IdP
    metadataXml string
    The raw SAML metadata XML from the IdP
    product string
    The Sysdig product (monitor or secure)
    ssoSamlId string
    timeouts SsoSamlTimeouts
    version number
    The version of the SSO configuration, used for optimistic locking during updates.
    create_user_on_login bool
    Whether to create a new user upon first login
    email_parameter str
    The SAML attribute name that contains the user's email address
    group_mapping_attribute_name str
    The SAML attribute name for group mapping
    integration_name str
    A name to distinguish different SSO integrations (cannot be changed after creation)
    is_active bool
    Whether the SSO configuration is active
    is_destination_verification_enabled bool
    Whether destination verification is enabled
    is_encryption_support_enabled bool
    Whether encryption support is enabled
    is_group_mapping_enabled bool
    Whether group mapping is enabled
    is_signature_validation_enabled bool
    Whether SAML response signature validation is enabled
    is_signed_assertion_enabled bool
    Whether signed SAML assertions are required
    is_single_logout_enabled bool
    Whether single logout is enabled
    is_system bool
    Whether this is a system SSO configuration (Only applicable to on-prem installations)
    metadata_url str
    The URL to fetch SAML metadata from the IdP
    metadata_xml str
    The raw SAML metadata XML from the IdP
    product str
    The Sysdig product (monitor or secure)
    sso_saml_id str
    timeouts SsoSamlTimeoutsArgs
    version float
    The version of the SSO configuration, used for optimistic locking during updates.
    createUserOnLogin Boolean
    Whether to create a new user upon first login
    emailParameter String
    The SAML attribute name that contains the user's email address
    groupMappingAttributeName String
    The SAML attribute name for group mapping
    integrationName String
    A name to distinguish different SSO integrations (cannot be changed after creation)
    isActive Boolean
    Whether the SSO configuration is active
    isDestinationVerificationEnabled Boolean
    Whether destination verification is enabled
    isEncryptionSupportEnabled Boolean
    Whether encryption support is enabled
    isGroupMappingEnabled Boolean
    Whether group mapping is enabled
    isSignatureValidationEnabled Boolean
    Whether SAML response signature validation is enabled
    isSignedAssertionEnabled Boolean
    Whether signed SAML assertions are required
    isSingleLogoutEnabled Boolean
    Whether single logout is enabled
    isSystem Boolean
    Whether this is a system SSO configuration (Only applicable to on-prem installations)
    metadataUrl String
    The URL to fetch SAML metadata from the IdP
    metadataXml String
    The raw SAML metadata XML from the IdP
    product String
    The Sysdig product (monitor or secure)
    ssoSamlId String
    timeouts Property Map
    version Number
    The version of the SSO configuration, used for optimistic locking during updates.

    Supporting Types

    SsoSamlTimeouts, SsoSamlTimeoutsArgs

    Create string
    Delete string
    Read string
    Update string
    Create string
    Delete string
    Read string
    Update string
    create String
    delete String
    read String
    update String
    create string
    delete string
    read string
    update string
    create str
    delete str
    read str
    update str
    create String
    delete String
    read String
    update String

    Import

    SAML SSO configurations can be imported using the SSO configuration ID:

    $ pulumi import sysdig:index/ssoSaml:SsoSaml example 12345
    

    For system-level SSO configurations (on-prem), prefix the ID with system/:

    $ pulumi import sysdig:index/ssoSaml:SsoSaml example system/12345
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    sysdig sysdiglabs/terraform-provider-sysdig
    License
    Notes
    This Pulumi package is based on the sysdig Terraform Provider.
    sysdig logo
    Viewing docs for sysdig 3.5.0
    published on Friday, Mar 6, 2026 by sysdiglabs
      Try Pulumi Cloud free. Your team will thank you.