blob: 96d7ea060cc4ee028398823b91bef81babb627b8 [file] [log] [blame] [edit]
<html><body>
<style>
body, h1, h2, h3, div, span, p, pre, a {
margin: 0;
padding: 0;
border: 0;
font-weight: inherit;
font-style: inherit;
font-size: 100%;
font-family: inherit;
vertical-align: baseline;
}
body {
font-size: 13px;
padding: 1em;
}
h1 {
font-size: 26px;
margin-bottom: 1em;
}
h2 {
font-size: 24px;
margin-bottom: 1em;
}
h3 {
font-size: 20px;
margin-bottom: 1em;
margin-top: 1em;
}
pre, code {
line-height: 1.5;
font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
}
pre {
margin-top: 0.5em;
}
h1, h2, h3, p {
font-family: Arial, sans serif;
}
h1, h2, h3 {
border-bottom: solid #CCC 1px;
}
.toc_element {
margin-top: 0.5em;
}
.firstline {
margin-left: 2 em;
}
.method {
margin-top: 1em;
border: solid 1px #CCC;
padding: 1em;
background: #EEE;
}
.details {
font-weight: bold;
font-size: 14px;
}
</style>
<h1><a href="identitytoolkit_v2.html">Identity Toolkit API</a> . <a href="identitytoolkit_v2.projects.html">projects</a> . <a href="identitytoolkit_v2.projects.inboundSamlConfigs.html">inboundSamlConfigs</a></h1>
<h2>Instance Methods</h2>
<p class="toc_element">
<code><a href="#close">close()</a></code></p>
<p class="firstline">Close httplib2 connections.</p>
<p class="toc_element">
<code><a href="#create">create(parent, body=None, inboundSamlConfigId=None, x__xgafv=None)</a></code></p>
<p class="firstline">Create an inbound SAML configuration for an Identity Toolkit project.</p>
<p class="toc_element">
<code><a href="#delete">delete(name, x__xgafv=None)</a></code></p>
<p class="firstline">Delete an inbound SAML configuration for an Identity Toolkit project.</p>
<p class="toc_element">
<code><a href="#get">get(name, x__xgafv=None)</a></code></p>
<p class="firstline">Retrieve an inbound SAML configuration for an Identity Toolkit project.</p>
<p class="toc_element">
<code><a href="#list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
<p class="firstline">List all inbound SAML configurations for an Identity Toolkit project.</p>
<p class="toc_element">
<code><a href="#list_next">list_next()</a></code></p>
<p class="firstline">Retrieves the next page of results.</p>
<p class="toc_element">
<code><a href="#patch">patch(name, body=None, updateMask=None, x__xgafv=None)</a></code></p>
<p class="firstline">Update an inbound SAML configuration for an Identity Toolkit project.</p>
<h3>Method Details</h3>
<div class="method">
<code class="details" id="close">close()</code>
<pre>Close httplib2 connections.</pre>
</div>
<div class="method">
<code class="details" id="create">create(parent, body=None, inboundSamlConfigId=None, x__xgafv=None)</code>
<pre>Create an inbound SAML configuration for an Identity Toolkit project.
Args:
parent: string, The parent resource name where the config to be created, for example: &quot;projects/my-awesome-project&quot; (required)
body: object, The request body.
The object takes the form of:
{ # A pair of SAML RP-IDP configurations when the project acts as the relying party.
&quot;displayName&quot;: &quot;A String&quot;, # The config&#x27;s display name set by developers.
&quot;enabled&quot;: True or False, # True if allows the user to sign in with the provider.
&quot;idpConfig&quot;: { # The SAML IdP (Identity Provider) configuration when the project acts as the relying party. # The SAML IdP (Identity Provider) configuration when the project acts as the relying party.
&quot;idpCertificates&quot;: [ # IDP&#x27;s public keys for verifying signature in the assertions.
{ # The IDP&#x27;s certificate data to verify the signature in the SAMLResponse issued by the IDP.
&quot;x509Certificate&quot;: &quot;A String&quot;, # The x509 certificate
},
],
&quot;idpEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
&quot;signRequest&quot;: True or False, # Indicates if outbounding SAMLRequest should be signed.
&quot;ssoUrl&quot;: &quot;A String&quot;, # URL to send Authentication request to.
},
&quot;name&quot;: &quot;A String&quot;, # The name of the InboundSamlConfig resource, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. Ignored during create requests.
&quot;spConfig&quot;: { # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider.
&quot;callbackUri&quot;: &quot;A String&quot;, # Callback URI where responses from IDP are handled.
&quot;spCertificates&quot;: [ # Output only. Public certificates generated by the server to verify the signature in SAMLRequest in the SP-initiated flow.
{ # The SP&#x27;s certificate data for IDP to verify the SAMLRequest generated by the SP.
&quot;expiresAt&quot;: &quot;A String&quot;, # Timestamp of the cert expiration instance.
&quot;x509Certificate&quot;: &quot;A String&quot;, # Self-signed public certificate.
},
],
&quot;spEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
},
}
inboundSamlConfigId: string, The id to use for this config.
x__xgafv: string, V1 error format.
Allowed values
1 - v1 error format
2 - v2 error format
Returns:
An object of the form:
{ # A pair of SAML RP-IDP configurations when the project acts as the relying party.
&quot;displayName&quot;: &quot;A String&quot;, # The config&#x27;s display name set by developers.
&quot;enabled&quot;: True or False, # True if allows the user to sign in with the provider.
&quot;idpConfig&quot;: { # The SAML IdP (Identity Provider) configuration when the project acts as the relying party. # The SAML IdP (Identity Provider) configuration when the project acts as the relying party.
&quot;idpCertificates&quot;: [ # IDP&#x27;s public keys for verifying signature in the assertions.
{ # The IDP&#x27;s certificate data to verify the signature in the SAMLResponse issued by the IDP.
&quot;x509Certificate&quot;: &quot;A String&quot;, # The x509 certificate
},
],
&quot;idpEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
&quot;signRequest&quot;: True or False, # Indicates if outbounding SAMLRequest should be signed.
&quot;ssoUrl&quot;: &quot;A String&quot;, # URL to send Authentication request to.
},
&quot;name&quot;: &quot;A String&quot;, # The name of the InboundSamlConfig resource, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. Ignored during create requests.
&quot;spConfig&quot;: { # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider.
&quot;callbackUri&quot;: &quot;A String&quot;, # Callback URI where responses from IDP are handled.
&quot;spCertificates&quot;: [ # Output only. Public certificates generated by the server to verify the signature in SAMLRequest in the SP-initiated flow.
{ # The SP&#x27;s certificate data for IDP to verify the SAMLRequest generated by the SP.
&quot;expiresAt&quot;: &quot;A String&quot;, # Timestamp of the cert expiration instance.
&quot;x509Certificate&quot;: &quot;A String&quot;, # Self-signed public certificate.
},
],
&quot;spEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
},
}</pre>
</div>
<div class="method">
<code class="details" id="delete">delete(name, x__xgafv=None)</code>
<pre>Delete an inbound SAML configuration for an Identity Toolkit project.
Args:
name: string, The resource name of the config to be deleted, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. (required)
x__xgafv: string, V1 error format.
Allowed values
1 - v1 error format
2 - v2 error format
Returns:
An object of the form:
{ # A generic empty message that you can re-use to avoid defining duplicated empty messages in your APIs. A typical example is to use it as the request or the response type of an API method. For instance: service Foo { rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty); }
}</pre>
</div>
<div class="method">
<code class="details" id="get">get(name, x__xgafv=None)</code>
<pre>Retrieve an inbound SAML configuration for an Identity Toolkit project.
Args:
name: string, The resource name of the config, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. (required)
x__xgafv: string, V1 error format.
Allowed values
1 - v1 error format
2 - v2 error format
Returns:
An object of the form:
{ # A pair of SAML RP-IDP configurations when the project acts as the relying party.
&quot;displayName&quot;: &quot;A String&quot;, # The config&#x27;s display name set by developers.
&quot;enabled&quot;: True or False, # True if allows the user to sign in with the provider.
&quot;idpConfig&quot;: { # The SAML IdP (Identity Provider) configuration when the project acts as the relying party. # The SAML IdP (Identity Provider) configuration when the project acts as the relying party.
&quot;idpCertificates&quot;: [ # IDP&#x27;s public keys for verifying signature in the assertions.
{ # The IDP&#x27;s certificate data to verify the signature in the SAMLResponse issued by the IDP.
&quot;x509Certificate&quot;: &quot;A String&quot;, # The x509 certificate
},
],
&quot;idpEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
&quot;signRequest&quot;: True or False, # Indicates if outbounding SAMLRequest should be signed.
&quot;ssoUrl&quot;: &quot;A String&quot;, # URL to send Authentication request to.
},
&quot;name&quot;: &quot;A String&quot;, # The name of the InboundSamlConfig resource, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. Ignored during create requests.
&quot;spConfig&quot;: { # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider.
&quot;callbackUri&quot;: &quot;A String&quot;, # Callback URI where responses from IDP are handled.
&quot;spCertificates&quot;: [ # Output only. Public certificates generated by the server to verify the signature in SAMLRequest in the SP-initiated flow.
{ # The SP&#x27;s certificate data for IDP to verify the SAMLRequest generated by the SP.
&quot;expiresAt&quot;: &quot;A String&quot;, # Timestamp of the cert expiration instance.
&quot;x509Certificate&quot;: &quot;A String&quot;, # Self-signed public certificate.
},
],
&quot;spEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
},
}</pre>
</div>
<div class="method">
<code class="details" id="list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</code>
<pre>List all inbound SAML configurations for an Identity Toolkit project.
Args:
parent: string, The parent resource name, for example, &quot;projects/my-awesome-project&quot;. (required)
pageSize: integer, The maximum number of items to return.
pageToken: string, The next_page_token value returned from a previous List request, if any.
x__xgafv: string, V1 error format.
Allowed values
1 - v1 error format
2 - v2 error format
Returns:
An object of the form:
{ # Response for ListInboundSamlConfigs
&quot;inboundSamlConfigs&quot;: [ # The set of configs.
{ # A pair of SAML RP-IDP configurations when the project acts as the relying party.
&quot;displayName&quot;: &quot;A String&quot;, # The config&#x27;s display name set by developers.
&quot;enabled&quot;: True or False, # True if allows the user to sign in with the provider.
&quot;idpConfig&quot;: { # The SAML IdP (Identity Provider) configuration when the project acts as the relying party. # The SAML IdP (Identity Provider) configuration when the project acts as the relying party.
&quot;idpCertificates&quot;: [ # IDP&#x27;s public keys for verifying signature in the assertions.
{ # The IDP&#x27;s certificate data to verify the signature in the SAMLResponse issued by the IDP.
&quot;x509Certificate&quot;: &quot;A String&quot;, # The x509 certificate
},
],
&quot;idpEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
&quot;signRequest&quot;: True or False, # Indicates if outbounding SAMLRequest should be signed.
&quot;ssoUrl&quot;: &quot;A String&quot;, # URL to send Authentication request to.
},
&quot;name&quot;: &quot;A String&quot;, # The name of the InboundSamlConfig resource, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. Ignored during create requests.
&quot;spConfig&quot;: { # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider.
&quot;callbackUri&quot;: &quot;A String&quot;, # Callback URI where responses from IDP are handled.
&quot;spCertificates&quot;: [ # Output only. Public certificates generated by the server to verify the signature in SAMLRequest in the SP-initiated flow.
{ # The SP&#x27;s certificate data for IDP to verify the SAMLRequest generated by the SP.
&quot;expiresAt&quot;: &quot;A String&quot;, # Timestamp of the cert expiration instance.
&quot;x509Certificate&quot;: &quot;A String&quot;, # Self-signed public certificate.
},
],
&quot;spEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
},
},
],
&quot;nextPageToken&quot;: &quot;A String&quot;, # Token to retrieve the next page of results, or empty if there are no more results in the list.
}</pre>
</div>
<div class="method">
<code class="details" id="list_next">list_next()</code>
<pre>Retrieves the next page of results.
Args:
previous_request: The request for the previous page. (required)
previous_response: The response from the request for the previous page. (required)
Returns:
A request object that you can call &#x27;execute()&#x27; on to request the next
page. Returns None if there are no more items in the collection.
</pre>
</div>
<div class="method">
<code class="details" id="patch">patch(name, body=None, updateMask=None, x__xgafv=None)</code>
<pre>Update an inbound SAML configuration for an Identity Toolkit project.
Args:
name: string, The name of the InboundSamlConfig resource, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. Ignored during create requests. (required)
body: object, The request body.
The object takes the form of:
{ # A pair of SAML RP-IDP configurations when the project acts as the relying party.
&quot;displayName&quot;: &quot;A String&quot;, # The config&#x27;s display name set by developers.
&quot;enabled&quot;: True or False, # True if allows the user to sign in with the provider.
&quot;idpConfig&quot;: { # The SAML IdP (Identity Provider) configuration when the project acts as the relying party. # The SAML IdP (Identity Provider) configuration when the project acts as the relying party.
&quot;idpCertificates&quot;: [ # IDP&#x27;s public keys for verifying signature in the assertions.
{ # The IDP&#x27;s certificate data to verify the signature in the SAMLResponse issued by the IDP.
&quot;x509Certificate&quot;: &quot;A String&quot;, # The x509 certificate
},
],
&quot;idpEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
&quot;signRequest&quot;: True or False, # Indicates if outbounding SAMLRequest should be signed.
&quot;ssoUrl&quot;: &quot;A String&quot;, # URL to send Authentication request to.
},
&quot;name&quot;: &quot;A String&quot;, # The name of the InboundSamlConfig resource, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. Ignored during create requests.
&quot;spConfig&quot;: { # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider.
&quot;callbackUri&quot;: &quot;A String&quot;, # Callback URI where responses from IDP are handled.
&quot;spCertificates&quot;: [ # Output only. Public certificates generated by the server to verify the signature in SAMLRequest in the SP-initiated flow.
{ # The SP&#x27;s certificate data for IDP to verify the SAMLRequest generated by the SP.
&quot;expiresAt&quot;: &quot;A String&quot;, # Timestamp of the cert expiration instance.
&quot;x509Certificate&quot;: &quot;A String&quot;, # Self-signed public certificate.
},
],
&quot;spEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
},
}
updateMask: string, The update mask applies to the resource. Empty update mask will result in updating nothing. For the `FieldMask` definition, see https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask
x__xgafv: string, V1 error format.
Allowed values
1 - v1 error format
2 - v2 error format
Returns:
An object of the form:
{ # A pair of SAML RP-IDP configurations when the project acts as the relying party.
&quot;displayName&quot;: &quot;A String&quot;, # The config&#x27;s display name set by developers.
&quot;enabled&quot;: True or False, # True if allows the user to sign in with the provider.
&quot;idpConfig&quot;: { # The SAML IdP (Identity Provider) configuration when the project acts as the relying party. # The SAML IdP (Identity Provider) configuration when the project acts as the relying party.
&quot;idpCertificates&quot;: [ # IDP&#x27;s public keys for verifying signature in the assertions.
{ # The IDP&#x27;s certificate data to verify the signature in the SAMLResponse issued by the IDP.
&quot;x509Certificate&quot;: &quot;A String&quot;, # The x509 certificate
},
],
&quot;idpEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
&quot;signRequest&quot;: True or False, # Indicates if outbounding SAMLRequest should be signed.
&quot;ssoUrl&quot;: &quot;A String&quot;, # URL to send Authentication request to.
},
&quot;name&quot;: &quot;A String&quot;, # The name of the InboundSamlConfig resource, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. Ignored during create requests.
&quot;spConfig&quot;: { # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider.
&quot;callbackUri&quot;: &quot;A String&quot;, # Callback URI where responses from IDP are handled.
&quot;spCertificates&quot;: [ # Output only. Public certificates generated by the server to verify the signature in SAMLRequest in the SP-initiated flow.
{ # The SP&#x27;s certificate data for IDP to verify the SAMLRequest generated by the SP.
&quot;expiresAt&quot;: &quot;A String&quot;, # Timestamp of the cert expiration instance.
&quot;x509Certificate&quot;: &quot;A String&quot;, # Self-signed public certificate.
},
],
&quot;spEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
},
}</pre>
</div>
</body></html>