sources_saml_list
GET/api/v3//sources/saml/
SAMLSource Viewset
Request
Query Parameters
Possible values: [POST
, POST_AUTO
, REDIRECT
]
Possible values: [http://www.w3.org/2000/09/xmldsig#sha1
, http://www.w3.org/2001/04/xmldsig-more#sha384
, http://www.w3.org/2001/04/xmlenc#sha256
, http://www.w3.org/2001/04/xmlenc#sha512
]
Possible values: [urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName
, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
, urn:oasis:names:tc:SAML:2.0:nameid-format:WindowsDomainQualifiedName
, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
, urn:oasis:names:tc:SAML:2.0:nameid-format:transient
]
NameID Policy sent to the IdP. Can be unset, in which case no Policy is sent.
Which field to use when ordering the results.
A page number within the paginated result set.
Number of results to return per page.
Possible values: [all
, any
]
A search term.
Possible values: [http://www.w3.org/2000/09/xmldsig#dsa-sha1
, http://www.w3.org/2000/09/xmldsig#rsa-sha1
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha1
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha256
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha384
, http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha512
, http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
, http://www.w3.org/2001/04/xmldsig-more#rsa-sha384
, http://www.w3.org/2001/04/xmldsig-more#rsa-sha512
]
Possible values: [email_deny
, email_link
, identifier
, username_deny
, username_link
]
How the source determines if an existing user should be authenticated or a new user enrolled.
Responses
- 200
- 400
- 403
- application/json
- Schema
- Example (auto)
Schema
pagination objectrequired
results object[]required
{
"pagination": {
"next": 0,
"previous": 0,
"count": 0,
"current": 0,
"total_pages": 0,
"start_index": 0,
"end_index": 0
},
"results": [
{
"pk": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"name": "string",
"slug": "string",
"enabled": true,
"authentication_flow": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"enrollment_flow": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"user_property_mappings": [
"3fa85f64-5717-4562-b3fc-2c963f66afa6"
],
"group_property_mappings": [
"3fa85f64-5717-4562-b3fc-2c963f66afa6"
],
"component": "string",
"verbose_name": "string",
"verbose_name_plural": "string",
"meta_model_name": "string",
"policy_engine_mode": "all",
"user_matching_mode": "identifier",
"managed": "string",
"user_path_template": "string",
"icon": "string",
"group_matching_mode": "identifier",
"pre_authentication_flow": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"issuer": "string",
"sso_url": "string",
"slo_url": "string",
"allow_idp_initiated": true,
"name_id_policy": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
"binding_type": "REDIRECT",
"verification_kp": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"signing_kp": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"digest_algorithm": "http://www.w3.org/2000/09/xmldsig#sha1",
"signature_algorithm": "http://www.w3.org/2000/09/xmldsig#rsa-sha1",
"temporary_user_delete_after": "string",
"encryption_kp": "3fa85f64-5717-4562-b3fc-2c963f66afa6"
}
]
}
- application/json
- Schema
- Example (auto)
Schema
Validation Error
{
"non_field_errors": [
"string"
],
"code": "string"
}
- application/json
- Schema
- Example (auto)
Schema
{
"detail": "string",
"code": "string"
}
Authorization: http
name: authentiktype: httpscheme: bearer
- csharp
- curl
- dart
- go
- http
- java
- javascript
- kotlin
- c
- nodejs
- objective-c
- ocaml
- php
- powershell
- python
- r
- ruby
- rust
- shell
- swift
- HTTPCLIENT
- RESTSHARP
var client = new HttpClient();
var request = new HttpRequestMessage(HttpMethod.Get, "/api/v3/sources/saml/");
request.Headers.Add("Accept", "application/json");
request.Headers.Add("Authorization", "Bearer <token>");
var response = await client.SendAsync(request);
response.EnsureSuccessStatusCode();
Console.WriteLine(await response.Content.ReadAsStringAsync());