1. Packages
  2. Google Cloud (GCP) Classic
  3. API Docs
  4. identityplatform
  5. InboundSamlConfig
Google Cloud v8.23.0 published on Monday, Mar 24, 2025 by Pulumi

gcp.identityplatform.InboundSamlConfig

Explore with Pulumi AI

Inbound SAML configuration for a Identity Toolkit project.

You must enable the Google Identity Platform in the marketplace prior to using this resource.

Example Usage

Identity Platform Inbound Saml Config Basic

import * as pulumi from "@pulumi/pulumi";
import * as gcp from "@pulumi/gcp";
import * as std from "@pulumi/std";

const samlConfig = new gcp.identityplatform.InboundSamlConfig("saml_config", {
    name: "saml.tf-config",
    displayName: "Display Name",
    idpConfig: {
        idpEntityId: "tf-idp",
        signRequest: true,
        ssoUrl: "https://example.com",
        idpCertificates: [{
            x509Certificate: std.file({
                input: "test-fixtures/rsa_cert.pem",
            }).then(invoke => invoke.result),
        }],
    },
    spConfig: {
        spEntityId: "tf-sp",
        callbackUri: "https://example.com",
    },
});
Copy
import pulumi
import pulumi_gcp as gcp
import pulumi_std as std

saml_config = gcp.identityplatform.InboundSamlConfig("saml_config",
    name="saml.tf-config",
    display_name="Display Name",
    idp_config={
        "idp_entity_id": "tf-idp",
        "sign_request": True,
        "sso_url": "https://example.com",
        "idp_certificates": [{
            "x509_certificate": std.file(input="test-fixtures/rsa_cert.pem").result,
        }],
    },
    sp_config={
        "sp_entity_id": "tf-sp",
        "callback_uri": "https://example.com",
    })
Copy
package main

import (
	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/identityplatform"
	"github.com/pulumi/pulumi-std/sdk/go/std"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		invokeFile, err := std.File(ctx, &std.FileArgs{
			Input: "test-fixtures/rsa_cert.pem",
		}, nil)
		if err != nil {
			return err
		}
		_, err = identityplatform.NewInboundSamlConfig(ctx, "saml_config", &identityplatform.InboundSamlConfigArgs{
			Name:        pulumi.String("saml.tf-config"),
			DisplayName: pulumi.String("Display Name"),
			IdpConfig: &identityplatform.InboundSamlConfigIdpConfigArgs{
				IdpEntityId: pulumi.String("tf-idp"),
				SignRequest: pulumi.Bool(true),
				SsoUrl:      pulumi.String("https://example.com"),
				IdpCertificates: identityplatform.InboundSamlConfigIdpConfigIdpCertificateArray{
					&identityplatform.InboundSamlConfigIdpConfigIdpCertificateArgs{
						X509Certificate: pulumi.String(invokeFile.Result),
					},
				},
			},
			SpConfig: &identityplatform.InboundSamlConfigSpConfigArgs{
				SpEntityId:  pulumi.String("tf-sp"),
				CallbackUri: pulumi.String("https://example.com"),
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
Copy
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Gcp = Pulumi.Gcp;
using Std = Pulumi.Std;

return await Deployment.RunAsync(() => 
{
    var samlConfig = new Gcp.IdentityPlatform.InboundSamlConfig("saml_config", new()
    {
        Name = "saml.tf-config",
        DisplayName = "Display Name",
        IdpConfig = new Gcp.IdentityPlatform.Inputs.InboundSamlConfigIdpConfigArgs
        {
            IdpEntityId = "tf-idp",
            SignRequest = true,
            SsoUrl = "https://example.com",
            IdpCertificates = new[]
            {
                new Gcp.IdentityPlatform.Inputs.InboundSamlConfigIdpConfigIdpCertificateArgs
                {
                    X509Certificate = Std.File.Invoke(new()
                    {
                        Input = "test-fixtures/rsa_cert.pem",
                    }).Apply(invoke => invoke.Result),
                },
            },
        },
        SpConfig = new Gcp.IdentityPlatform.Inputs.InboundSamlConfigSpConfigArgs
        {
            SpEntityId = "tf-sp",
            CallbackUri = "https://example.com",
        },
    });

});
Copy
package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.identityplatform.InboundSamlConfig;
import com.pulumi.gcp.identityplatform.InboundSamlConfigArgs;
import com.pulumi.gcp.identityplatform.inputs.InboundSamlConfigIdpConfigArgs;
import com.pulumi.gcp.identityplatform.inputs.InboundSamlConfigSpConfigArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var samlConfig = new InboundSamlConfig("samlConfig", InboundSamlConfigArgs.builder()
            .name("saml.tf-config")
            .displayName("Display Name")
            .idpConfig(InboundSamlConfigIdpConfigArgs.builder()
                .idpEntityId("tf-idp")
                .signRequest(true)
                .ssoUrl("https://example.com")
                .idpCertificates(InboundSamlConfigIdpConfigIdpCertificateArgs.builder()
                    .x509Certificate(StdFunctions.file(FileArgs.builder()
                        .input("test-fixtures/rsa_cert.pem")
                        .build()).result())
                    .build())
                .build())
            .spConfig(InboundSamlConfigSpConfigArgs.builder()
                .spEntityId("tf-sp")
                .callbackUri("https://example.com")
                .build())
            .build());

    }
}
Copy
resources:
  samlConfig:
    type: gcp:identityplatform:InboundSamlConfig
    name: saml_config
    properties:
      name: saml.tf-config
      displayName: Display Name
      idpConfig:
        idpEntityId: tf-idp
        signRequest: true
        ssoUrl: https://example.com
        idpCertificates:
          - x509Certificate:
              fn::invoke:
                function: std:file
                arguments:
                  input: test-fixtures/rsa_cert.pem
                return: result
      spConfig:
        spEntityId: tf-sp
        callbackUri: https://example.com
Copy

Create InboundSamlConfig Resource

Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

Constructor syntax

new InboundSamlConfig(name: string, args: InboundSamlConfigArgs, opts?: CustomResourceOptions);
@overload
def InboundSamlConfig(resource_name: str,
                      args: InboundSamlConfigArgs,
                      opts: Optional[ResourceOptions] = None)

@overload
def InboundSamlConfig(resource_name: str,
                      opts: Optional[ResourceOptions] = None,
                      display_name: Optional[str] = None,
                      idp_config: Optional[InboundSamlConfigIdpConfigArgs] = None,
                      sp_config: Optional[InboundSamlConfigSpConfigArgs] = None,
                      enabled: Optional[bool] = None,
                      name: Optional[str] = None,
                      project: Optional[str] = None)
func NewInboundSamlConfig(ctx *Context, name string, args InboundSamlConfigArgs, opts ...ResourceOption) (*InboundSamlConfig, error)
public InboundSamlConfig(string name, InboundSamlConfigArgs args, CustomResourceOptions? opts = null)
public InboundSamlConfig(String name, InboundSamlConfigArgs args)
public InboundSamlConfig(String name, InboundSamlConfigArgs args, CustomResourceOptions options)
type: gcp:identityplatform:InboundSamlConfig
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

Parameters

name This property is required. string
The unique name of the resource.
args This property is required. InboundSamlConfigArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name This property is required. str
The unique name of the resource.
args This property is required. InboundSamlConfigArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name This property is required. string
The unique name of the resource.
args This property is required. InboundSamlConfigArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name This property is required. string
The unique name of the resource.
args This property is required. InboundSamlConfigArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name This property is required. String
The unique name of the resource.
args This property is required. InboundSamlConfigArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

Constructor example

The following reference example uses placeholder values for all input properties.

var inboundSamlConfigResource = new Gcp.IdentityPlatform.InboundSamlConfig("inboundSamlConfigResource", new()
{
    DisplayName = "string",
    IdpConfig = new Gcp.IdentityPlatform.Inputs.InboundSamlConfigIdpConfigArgs
    {
        IdpCertificates = new[]
        {
            new Gcp.IdentityPlatform.Inputs.InboundSamlConfigIdpConfigIdpCertificateArgs
            {
                X509Certificate = "string",
            },
        },
        IdpEntityId = "string",
        SsoUrl = "string",
        SignRequest = false,
    },
    SpConfig = new Gcp.IdentityPlatform.Inputs.InboundSamlConfigSpConfigArgs
    {
        CallbackUri = "string",
        SpCertificates = new[]
        {
            new Gcp.IdentityPlatform.Inputs.InboundSamlConfigSpConfigSpCertificateArgs
            {
                X509Certificate = "string",
            },
        },
        SpEntityId = "string",
    },
    Enabled = false,
    Name = "string",
    Project = "string",
});
Copy
example, err := identityplatform.NewInboundSamlConfig(ctx, "inboundSamlConfigResource", &identityplatform.InboundSamlConfigArgs{
	DisplayName: pulumi.String("string"),
	IdpConfig: &identityplatform.InboundSamlConfigIdpConfigArgs{
		IdpCertificates: identityplatform.InboundSamlConfigIdpConfigIdpCertificateArray{
			&identityplatform.InboundSamlConfigIdpConfigIdpCertificateArgs{
				X509Certificate: pulumi.String("string"),
			},
		},
		IdpEntityId: pulumi.String("string"),
		SsoUrl:      pulumi.String("string"),
		SignRequest: pulumi.Bool(false),
	},
	SpConfig: &identityplatform.InboundSamlConfigSpConfigArgs{
		CallbackUri: pulumi.String("string"),
		SpCertificates: identityplatform.InboundSamlConfigSpConfigSpCertificateArray{
			&identityplatform.InboundSamlConfigSpConfigSpCertificateArgs{
				X509Certificate: pulumi.String("string"),
			},
		},
		SpEntityId: pulumi.String("string"),
	},
	Enabled: pulumi.Bool(false),
	Name:    pulumi.String("string"),
	Project: pulumi.String("string"),
})
Copy
var inboundSamlConfigResource = new InboundSamlConfig("inboundSamlConfigResource", InboundSamlConfigArgs.builder()
    .displayName("string")
    .idpConfig(InboundSamlConfigIdpConfigArgs.builder()
        .idpCertificates(InboundSamlConfigIdpConfigIdpCertificateArgs.builder()
            .x509Certificate("string")
            .build())
        .idpEntityId("string")
        .ssoUrl("string")
        .signRequest(false)
        .build())
    .spConfig(InboundSamlConfigSpConfigArgs.builder()
        .callbackUri("string")
        .spCertificates(InboundSamlConfigSpConfigSpCertificateArgs.builder()
            .x509Certificate("string")
            .build())
        .spEntityId("string")
        .build())
    .enabled(false)
    .name("string")
    .project("string")
    .build());
Copy
inbound_saml_config_resource = gcp.identityplatform.InboundSamlConfig("inboundSamlConfigResource",
    display_name="string",
    idp_config={
        "idp_certificates": [{
            "x509_certificate": "string",
        }],
        "idp_entity_id": "string",
        "sso_url": "string",
        "sign_request": False,
    },
    sp_config={
        "callback_uri": "string",
        "sp_certificates": [{
            "x509_certificate": "string",
        }],
        "sp_entity_id": "string",
    },
    enabled=False,
    name="string",
    project="string")
Copy
const inboundSamlConfigResource = new gcp.identityplatform.InboundSamlConfig("inboundSamlConfigResource", {
    displayName: "string",
    idpConfig: {
        idpCertificates: [{
            x509Certificate: "string",
        }],
        idpEntityId: "string",
        ssoUrl: "string",
        signRequest: false,
    },
    spConfig: {
        callbackUri: "string",
        spCertificates: [{
            x509Certificate: "string",
        }],
        spEntityId: "string",
    },
    enabled: false,
    name: "string",
    project: "string",
});
Copy
type: gcp:identityplatform:InboundSamlConfig
properties:
    displayName: string
    enabled: false
    idpConfig:
        idpCertificates:
            - x509Certificate: string
        idpEntityId: string
        signRequest: false
        ssoUrl: string
    name: string
    project: string
    spConfig:
        callbackUri: string
        spCertificates:
            - x509Certificate: string
        spEntityId: string
Copy

InboundSamlConfig Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

The InboundSamlConfig resource accepts the following input properties:

DisplayName This property is required. string
Human friendly display name.
IdpConfig This property is required. InboundSamlConfigIdpConfig
SAML IdP configuration when the project acts as the relying party Structure is documented below.
SpConfig This property is required. InboundSamlConfigSpConfig
SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
Enabled bool
If this config allows users to sign in with the provider.
Name Changes to this property will trigger replacement. string
The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
Project Changes to this property will trigger replacement. string
DisplayName This property is required. string
Human friendly display name.
IdpConfig This property is required. InboundSamlConfigIdpConfigArgs
SAML IdP configuration when the project acts as the relying party Structure is documented below.
SpConfig This property is required. InboundSamlConfigSpConfigArgs
SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
Enabled bool
If this config allows users to sign in with the provider.
Name Changes to this property will trigger replacement. string
The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
Project Changes to this property will trigger replacement. string
displayName This property is required. String
Human friendly display name.
idpConfig This property is required. InboundSamlConfigIdpConfig
SAML IdP configuration when the project acts as the relying party Structure is documented below.
spConfig This property is required. InboundSamlConfigSpConfig
SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
enabled Boolean
If this config allows users to sign in with the provider.
name Changes to this property will trigger replacement. String
The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
project Changes to this property will trigger replacement. String
displayName This property is required. string
Human friendly display name.
idpConfig This property is required. InboundSamlConfigIdpConfig
SAML IdP configuration when the project acts as the relying party Structure is documented below.
spConfig This property is required. InboundSamlConfigSpConfig
SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
enabled boolean
If this config allows users to sign in with the provider.
name Changes to this property will trigger replacement. string
The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
project Changes to this property will trigger replacement. string
display_name This property is required. str
Human friendly display name.
idp_config This property is required. InboundSamlConfigIdpConfigArgs
SAML IdP configuration when the project acts as the relying party Structure is documented below.
sp_config This property is required. InboundSamlConfigSpConfigArgs
SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
enabled bool
If this config allows users to sign in with the provider.
name Changes to this property will trigger replacement. str
The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
project Changes to this property will trigger replacement. str
displayName This property is required. String
Human friendly display name.
idpConfig This property is required. Property Map
SAML IdP configuration when the project acts as the relying party Structure is documented below.
spConfig This property is required. Property Map
SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
enabled Boolean
If this config allows users to sign in with the provider.
name Changes to this property will trigger replacement. String
The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
project Changes to this property will trigger replacement. String

Outputs

All input properties are implicitly available as output properties. Additionally, the InboundSamlConfig resource produces the following output properties:

Id string
The provider-assigned unique ID for this managed resource.
Id string
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.
id string
The provider-assigned unique ID for this managed resource.
id str
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.

Look up Existing InboundSamlConfig Resource

Get an existing InboundSamlConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: InboundSamlConfigState, opts?: CustomResourceOptions): InboundSamlConfig
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        display_name: Optional[str] = None,
        enabled: Optional[bool] = None,
        idp_config: Optional[InboundSamlConfigIdpConfigArgs] = None,
        name: Optional[str] = None,
        project: Optional[str] = None,
        sp_config: Optional[InboundSamlConfigSpConfigArgs] = None) -> InboundSamlConfig
func GetInboundSamlConfig(ctx *Context, name string, id IDInput, state *InboundSamlConfigState, opts ...ResourceOption) (*InboundSamlConfig, error)
public static InboundSamlConfig Get(string name, Input<string> id, InboundSamlConfigState? state, CustomResourceOptions? opts = null)
public static InboundSamlConfig get(String name, Output<String> id, InboundSamlConfigState state, CustomResourceOptions options)
resources:  _:    type: gcp:identityplatform:InboundSamlConfig    get:      id: ${id}
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
DisplayName string
Human friendly display name.
Enabled bool
If this config allows users to sign in with the provider.
IdpConfig InboundSamlConfigIdpConfig
SAML IdP configuration when the project acts as the relying party Structure is documented below.
Name Changes to this property will trigger replacement. string
The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
Project Changes to this property will trigger replacement. string
SpConfig InboundSamlConfigSpConfig
SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
DisplayName string
Human friendly display name.
Enabled bool
If this config allows users to sign in with the provider.
IdpConfig InboundSamlConfigIdpConfigArgs
SAML IdP configuration when the project acts as the relying party Structure is documented below.
Name Changes to this property will trigger replacement. string
The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
Project Changes to this property will trigger replacement. string
SpConfig InboundSamlConfigSpConfigArgs
SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
displayName String
Human friendly display name.
enabled Boolean
If this config allows users to sign in with the provider.
idpConfig InboundSamlConfigIdpConfig
SAML IdP configuration when the project acts as the relying party Structure is documented below.
name Changes to this property will trigger replacement. String
The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
project Changes to this property will trigger replacement. String
spConfig InboundSamlConfigSpConfig
SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
displayName string
Human friendly display name.
enabled boolean
If this config allows users to sign in with the provider.
idpConfig InboundSamlConfigIdpConfig
SAML IdP configuration when the project acts as the relying party Structure is documented below.
name Changes to this property will trigger replacement. string
The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
project Changes to this property will trigger replacement. string
spConfig InboundSamlConfigSpConfig
SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
display_name str
Human friendly display name.
enabled bool
If this config allows users to sign in with the provider.
idp_config InboundSamlConfigIdpConfigArgs
SAML IdP configuration when the project acts as the relying party Structure is documented below.
name Changes to this property will trigger replacement. str
The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
project Changes to this property will trigger replacement. str
sp_config InboundSamlConfigSpConfigArgs
SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.
displayName String
Human friendly display name.
enabled Boolean
If this config allows users to sign in with the provider.
idpConfig Property Map
SAML IdP configuration when the project acts as the relying party Structure is documented below.
name Changes to this property will trigger replacement. String
The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
project Changes to this property will trigger replacement. String
spConfig Property Map
SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. Structure is documented below.

Supporting Types

InboundSamlConfigIdpConfig
, InboundSamlConfigIdpConfigArgs

IdpCertificates This property is required. List<InboundSamlConfigIdpConfigIdpCertificate>
The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
IdpEntityId This property is required. string
Unique identifier for all SAML entities
SsoUrl This property is required. string
URL to send Authentication request to.
SignRequest bool
Indicates if outbounding SAMLRequest should be signed.
IdpCertificates This property is required. []InboundSamlConfigIdpConfigIdpCertificate
The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
IdpEntityId This property is required. string
Unique identifier for all SAML entities
SsoUrl This property is required. string
URL to send Authentication request to.
SignRequest bool
Indicates if outbounding SAMLRequest should be signed.
idpCertificates This property is required. List<InboundSamlConfigIdpConfigIdpCertificate>
The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
idpEntityId This property is required. String
Unique identifier for all SAML entities
ssoUrl This property is required. String
URL to send Authentication request to.
signRequest Boolean
Indicates if outbounding SAMLRequest should be signed.
idpCertificates This property is required. InboundSamlConfigIdpConfigIdpCertificate[]
The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
idpEntityId This property is required. string
Unique identifier for all SAML entities
ssoUrl This property is required. string
URL to send Authentication request to.
signRequest boolean
Indicates if outbounding SAMLRequest should be signed.
idp_certificates This property is required. Sequence[InboundSamlConfigIdpConfigIdpCertificate]
The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
idp_entity_id This property is required. str
Unique identifier for all SAML entities
sso_url This property is required. str
URL to send Authentication request to.
sign_request bool
Indicates if outbounding SAMLRequest should be signed.
idpCertificates This property is required. List<Property Map>
The IdP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.
idpEntityId This property is required. String
Unique identifier for all SAML entities
ssoUrl This property is required. String
URL to send Authentication request to.
signRequest Boolean
Indicates if outbounding SAMLRequest should be signed.

InboundSamlConfigIdpConfigIdpCertificate
, InboundSamlConfigIdpConfigIdpCertificateArgs

X509Certificate string
The IdP's x509 certificate.
X509Certificate string
The IdP's x509 certificate.
x509Certificate String
The IdP's x509 certificate.
x509Certificate string
The IdP's x509 certificate.
x509_certificate str
The IdP's x509 certificate.
x509Certificate String
The IdP's x509 certificate.

InboundSamlConfigSpConfig
, InboundSamlConfigSpConfigArgs

CallbackUri string
Callback URI where responses from IDP are handled. Must start with https://.
SpCertificates List<InboundSamlConfigSpConfigSpCertificate>

(Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.

The sp_certificates block contains:

SpEntityId string
Unique identifier for all SAML entities.
CallbackUri string
Callback URI where responses from IDP are handled. Must start with https://.
SpCertificates []InboundSamlConfigSpConfigSpCertificate

(Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.

The sp_certificates block contains:

SpEntityId string
Unique identifier for all SAML entities.
callbackUri String
Callback URI where responses from IDP are handled. Must start with https://.
spCertificates List<InboundSamlConfigSpConfigSpCertificate>

(Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.

The sp_certificates block contains:

spEntityId String
Unique identifier for all SAML entities.
callbackUri string
Callback URI where responses from IDP are handled. Must start with https://.
spCertificates InboundSamlConfigSpConfigSpCertificate[]

(Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.

The sp_certificates block contains:

spEntityId string
Unique identifier for all SAML entities.
callback_uri str
Callback URI where responses from IDP are handled. Must start with https://.
sp_certificates Sequence[InboundSamlConfigSpConfigSpCertificate]

(Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.

The sp_certificates block contains:

sp_entity_id str
Unique identifier for all SAML entities.
callbackUri String
Callback URI where responses from IDP are handled. Must start with https://.
spCertificates List<Property Map>

(Output) The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP. Structure is documented below.

The sp_certificates block contains:

spEntityId String
Unique identifier for all SAML entities.

InboundSamlConfigSpConfigSpCertificate
, InboundSamlConfigSpConfigSpCertificateArgs

X509Certificate string
The x509 certificate
X509Certificate string
The x509 certificate
x509Certificate String
The x509 certificate
x509Certificate string
The x509 certificate
x509_certificate str
The x509 certificate
x509Certificate String
The x509 certificate

Import

InboundSamlConfig can be imported using any of these accepted formats:

  • projects/{{project}}/inboundSamlConfigs/{{name}}

  • {{project}}/{{name}}

  • {{name}}

When using the pulumi import command, InboundSamlConfig can be imported using one of the formats above. For example:

$ pulumi import gcp:identityplatform/inboundSamlConfig:InboundSamlConfig default projects/{{project}}/inboundSamlConfigs/{{name}}
Copy
$ pulumi import gcp:identityplatform/inboundSamlConfig:InboundSamlConfig default {{project}}/{{name}}
Copy
$ pulumi import gcp:identityplatform/inboundSamlConfig:InboundSamlConfig default {{name}}
Copy

To learn more about importing existing cloud resources, see Importing resources.

Package Details

Repository
Google Cloud (GCP) Classic pulumi/pulumi-gcp
License
Apache-2.0
Notes
This Pulumi package is based on the google-beta Terraform Provider.