SAMLAuthenticatorInfo
Information about SAML Authenticator.
{
"administrator_url": "https://vidm.example.com/saas/api/1.0/GET/admindata",
"authenticator_type": "DYNAMIC",
"certificate": "-----BEGIN CERTIFICATE-----\nMIID8DCCAtigAwIBAgIFFVeQUwEwDQY...-----END CERTIFICATE-----\n",
"certificate_type": "PEM",
"description": "Dynamic Saml Authenticator",
"id": "42e47f15-aad0-221a-b231-ea4a3a134ec9",
"label": "vidm.example.com",
"metadata_url": "https://vidm.example.com/saas/api/1.0/GET/metadata/idp.xml",
"password_mode": "REMOVE",
"static_metadata": "<md:EntityDescriptor xmlns:..</md:EntityDescriptor>",
"trigger_mode": "DISABLED"
}
The administrator URL for the SAML authenticator.
The type of SAML authenticator.
- STATIC: Static SAML Authenticator, which contains SAML metadata.
- DYNAMIC: Dynamic SAML Authenticator fetches metadata dynamically using a provided URL.
SAML Authenticator certificate.
Type of Certificate.
- PEM: PEM encoded certificate type
- UNKNOWN: Unknown certificate type
The description of this SAML authenticator.
Unique ID representing this SAML Authenticator.
The label for this SAML authenticator.
The metadata URL of the SAML Authenticator.
Indicates how password present in SAML assertion is handled if True SSO is triggered.
- REMOVE: Remove any passwords.
- PASSTHRU: Pass through any passwords.
- ERROR: Error if there is a password.
The static metadata of a SAML authenticator which contains an entity id, signing keys, and encryption keys for processing SAML authentication.
Indicates how True SSO is triggered on sessions using this authenticator.
- DISABLED: Do not use True SSO.
- ENABLE_IF_NO_PASSWORD: If no password is supplied, use a valid (domain matching) connector if it exists.
- REQUIRE_IF_NO_PASSWORD: If no password is supplied, use and require a valid (domain matching) connector.
- ENABLE_ALWAYS: Regardless of a password, use a valid (domain matching) connector if it exists.
- REQUIRE_ALWAYS: Regardless of a password, use and require a valid (domain matching) connector.