MongoDB Atlas v3.18.0 published on Thursday, Sep 12, 2024 by Pulumi
mongodbatlas.getFederatedSettingsIdentityProvider
Explore with Pulumi AI
# Data Source: mongodbatlas.FederatedSettingsIdentityProvider
mongodbatlas.FederatedSettingsIdentityProvider
provides a federated settings identity provider data source. Atlas federated settings identity provider provides federated settings outputs for the configured identity provider.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as mongodbatlas from "@pulumi/mongodbatlas";
const identityProvider = new mongodbatlas.FederatedSettingsIdentityProvider("identity_provider", {
federationSettingsId: "627a9687f7f7f7f774de306f14",
name: "mongodb_federation_test",
associatedDomains: ["yourdomain.com"],
ssoDebugEnabled: true,
status: "ACTIVE",
ssoUrl: "https://mysso.oktapreview.com/app/mysso_terraformtest_1/exk177f7f7f70h8/sso/saml",
issuerUri: "http://www.okta.com/exk17f7f7f7f7p50h8",
requestBinding: "HTTP-POST",
responseSignatureAlgorithm: "SHA-256",
});
const identityProviderDs = mongodbatlas.getFederatedSettingsIdentityProviderOutput({
federationSettingsId: identityProvider.id,
identityProviderId: "0oad4fas87jL5Xnk12971234",
});
import pulumi
import pulumi_mongodbatlas as mongodbatlas
identity_provider = mongodbatlas.FederatedSettingsIdentityProvider("identity_provider",
federation_settings_id="627a9687f7f7f7f774de306f14",
name="mongodb_federation_test",
associated_domains=["yourdomain.com"],
sso_debug_enabled=True,
status="ACTIVE",
sso_url="https://mysso.oktapreview.com/app/mysso_terraformtest_1/exk177f7f7f70h8/sso/saml",
issuer_uri="http://www.okta.com/exk17f7f7f7f7p50h8",
request_binding="HTTP-POST",
response_signature_algorithm="SHA-256")
identity_provider_ds = mongodbatlas.get_federated_settings_identity_provider_output(federation_settings_id=identity_provider.id,
identity_provider_id="0oad4fas87jL5Xnk12971234")
package main
import (
"github.com/pulumi/pulumi-mongodbatlas/sdk/v3/go/mongodbatlas"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
identityProvider, err := mongodbatlas.NewFederatedSettingsIdentityProvider(ctx, "identity_provider", &mongodbatlas.FederatedSettingsIdentityProviderArgs{
FederationSettingsId: pulumi.String("627a9687f7f7f7f774de306f14"),
Name: pulumi.String("mongodb_federation_test"),
AssociatedDomains: pulumi.StringArray{
pulumi.String("yourdomain.com"),
},
SsoDebugEnabled: pulumi.Bool(true),
Status: pulumi.String("ACTIVE"),
SsoUrl: pulumi.String("https://mysso.oktapreview.com/app/mysso_terraformtest_1/exk177f7f7f70h8/sso/saml"),
IssuerUri: pulumi.String("http://www.okta.com/exk17f7f7f7f7p50h8"),
RequestBinding: pulumi.String("HTTP-POST"),
ResponseSignatureAlgorithm: pulumi.String("SHA-256"),
})
if err != nil {
return err
}
_ = mongodbatlas.LookupFederatedSettingsIdentityProviderOutput(ctx, mongodbatlas.GetFederatedSettingsIdentityProviderOutputArgs{
FederationSettingsId: identityProvider.ID(),
IdentityProviderId: pulumi.String("0oad4fas87jL5Xnk12971234"),
}, nil)
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Mongodbatlas = Pulumi.Mongodbatlas;
return await Deployment.RunAsync(() =>
{
var identityProvider = new Mongodbatlas.FederatedSettingsIdentityProvider("identity_provider", new()
{
FederationSettingsId = "627a9687f7f7f7f774de306f14",
Name = "mongodb_federation_test",
AssociatedDomains = new[]
{
"yourdomain.com",
},
SsoDebugEnabled = true,
Status = "ACTIVE",
SsoUrl = "https://mysso.oktapreview.com/app/mysso_terraformtest_1/exk177f7f7f70h8/sso/saml",
IssuerUri = "http://www.okta.com/exk17f7f7f7f7p50h8",
RequestBinding = "HTTP-POST",
ResponseSignatureAlgorithm = "SHA-256",
});
var identityProviderDs = Mongodbatlas.GetFederatedSettingsIdentityProvider.Invoke(new()
{
FederationSettingsId = identityProvider.Id,
IdentityProviderId = "0oad4fas87jL5Xnk12971234",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.mongodbatlas.FederatedSettingsIdentityProvider;
import com.pulumi.mongodbatlas.FederatedSettingsIdentityProviderArgs;
import com.pulumi.mongodbatlas.MongodbatlasFunctions;
import com.pulumi.mongodbatlas.inputs.GetFederatedSettingsIdentityProviderArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var identityProvider = new FederatedSettingsIdentityProvider("identityProvider", FederatedSettingsIdentityProviderArgs.builder()
.federationSettingsId("627a9687f7f7f7f774de306f14")
.name("mongodb_federation_test")
.associatedDomains("yourdomain.com")
.ssoDebugEnabled(true)
.status("ACTIVE")
.ssoUrl("https://mysso.oktapreview.com/app/mysso_terraformtest_1/exk177f7f7f70h8/sso/saml")
.issuerUri("http://www.okta.com/exk17f7f7f7f7p50h8")
.requestBinding("HTTP-POST")
.responseSignatureAlgorithm("SHA-256")
.build());
final var identityProviderDs = MongodbatlasFunctions.getFederatedSettingsIdentityProvider(GetFederatedSettingsIdentityProviderArgs.builder()
.federationSettingsId(identityProvider.id())
.identityProviderId("0oad4fas87jL5Xnk12971234")
.build());
}
}
resources:
identityProvider:
type: mongodbatlas:FederatedSettingsIdentityProvider
name: identity_provider
properties:
federationSettingsId: 627a9687f7f7f7f774de306f14
name: mongodb_federation_test
associatedDomains:
- yourdomain.com
ssoDebugEnabled: true
status: ACTIVE
ssoUrl: https://mysso.oktapreview.com/app/mysso_terraformtest_1/exk177f7f7f70h8/sso/saml
issuerUri: http://www.okta.com/exk17f7f7f7f7p50h8
requestBinding: HTTP-POST
responseSignatureAlgorithm: SHA-256
variables:
identityProviderDs:
fn::invoke:
Function: mongodbatlas:getFederatedSettingsIdentityProvider
Arguments:
federationSettingsId: ${identityProvider.id}
identityProviderId: 0oad4fas87jL5Xnk12971234
Using getFederatedSettingsIdentityProvider
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getFederatedSettingsIdentityProvider(args: GetFederatedSettingsIdentityProviderArgs, opts?: InvokeOptions): Promise<GetFederatedSettingsIdentityProviderResult>
function getFederatedSettingsIdentityProviderOutput(args: GetFederatedSettingsIdentityProviderOutputArgs, opts?: InvokeOptions): Output<GetFederatedSettingsIdentityProviderResult>
def get_federated_settings_identity_provider(federation_settings_id: Optional[str] = None,
identity_provider_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetFederatedSettingsIdentityProviderResult
def get_federated_settings_identity_provider_output(federation_settings_id: Optional[pulumi.Input[str]] = None,
identity_provider_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetFederatedSettingsIdentityProviderResult]
func LookupFederatedSettingsIdentityProvider(ctx *Context, args *LookupFederatedSettingsIdentityProviderArgs, opts ...InvokeOption) (*LookupFederatedSettingsIdentityProviderResult, error)
func LookupFederatedSettingsIdentityProviderOutput(ctx *Context, args *LookupFederatedSettingsIdentityProviderOutputArgs, opts ...InvokeOption) LookupFederatedSettingsIdentityProviderResultOutput
> Note: This function is named LookupFederatedSettingsIdentityProvider
in the Go SDK.
public static class GetFederatedSettingsIdentityProvider
{
public static Task<GetFederatedSettingsIdentityProviderResult> InvokeAsync(GetFederatedSettingsIdentityProviderArgs args, InvokeOptions? opts = null)
public static Output<GetFederatedSettingsIdentityProviderResult> Invoke(GetFederatedSettingsIdentityProviderInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetFederatedSettingsIdentityProviderResult> getFederatedSettingsIdentityProvider(GetFederatedSettingsIdentityProviderArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: mongodbatlas:index/getFederatedSettingsIdentityProvider:getFederatedSettingsIdentityProvider
arguments:
# arguments dictionary
The following arguments are supported:
- Federation
Settings stringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- Identity
Provider stringId - Unique 24-hexadecimal digit string that identifies the IdP.
- Federation
Settings stringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- Identity
Provider stringId - Unique 24-hexadecimal digit string that identifies the IdP.
- federation
Settings StringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- identity
Provider StringId - Unique 24-hexadecimal digit string that identifies the IdP.
- federation
Settings stringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- identity
Provider stringId - Unique 24-hexadecimal digit string that identifies the IdP.
- federation_
settings_ strid - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- identity_
provider_ strid - Unique 24-hexadecimal digit string that identifies the IdP.
- federation
Settings StringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- identity
Provider StringId - Unique 24-hexadecimal digit string that identifies the IdP.
getFederatedSettingsIdentityProvider Result
The following output properties are available:
- Acs
Url string - Assertion consumer service URL to which the IdP sends the SAML response.
- Associated
Domains List<string> - List that contains the configured domains from which users can log in for this IdP.
- Associated
Orgs List<GetFederated Settings Identity Provider Associated Org> - List that contains the organizations from which users can log in for this IdP.
- Audience string
- Identifier of the intended recipient of the token.
- Audience
Uri string - Identifier for the intended audience of the SAML Assertion.
- string
- Indicates whether authorization is granted based on group membership or user ID. Valid values are
GROUP
orUSER
. - Client
Id string - Client identifier that is assigned to an application by the Identity Provider.
- Description string
- The description of the identity provider.
- Display
Name string - Human-readable label that identifies the IdP.
- Federation
Settings stringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- Groups
Claim string - Identifier of the claim which contains IdP Group IDs in the token.
- Id string
- The provider-assigned unique ID for this managed resource.
- Identity
Provider stringId - Idp
Id string - Unique 24-hexadecimal digit string that identifies the IdP
- Idp
Type string - Type of the identity provider. Valid values are
WORKFORCE
orWORKLOAD
. - Issuer
Uri string - Identifier for the issuer of the SAML Assertion.
- Okta
Idp stringId - Unique 20-hexadecimal digit string that identifies the IdP.
- Pem
File List<GetInfos Federated Settings Identity Provider Pem File Info> - Protocol string
- The protocol of the identity provider. Valid values are
SAML
orOIDC
. - Request
Binding string - SAML Authentication Request Protocol binding used to send the AuthNRequest. Atlas supports the following binding values:
- HTTP POST
- HTTP REDIRECT
- Requested
Scopes List<string> - Scopes that MongoDB applications will request from the authorization endpoint.
- Response
Signature stringAlgorithm - Algorithm used to encrypt the IdP signature. Atlas supports the following signature algorithm values:
- SHA-1
- SHA-256
- Sso
Debug boolEnabled - Flag that indicates whether the IdP has enabled Bypass SAML Mode. Enabling this mode generates a URL that allows you bypass SAML and login to your organizations at any point. You can authenticate with this special URL only when Bypass Mode is enabled. Set this parameter to true during testing. This keeps you from getting locked out of MongoDB.
- Sso
Url string - URL of the receiver of the SAML AuthNRequest.
- Status string
- Label that indicates whether the identity provider is active. The IdP is Inactive until you map at least one domain to the IdP.
- User
Claim string - Identifier of the claim which contains the user ID in the token.
- Acs
Url string - Assertion consumer service URL to which the IdP sends the SAML response.
- Associated
Domains []string - List that contains the configured domains from which users can log in for this IdP.
- Associated
Orgs []GetFederated Settings Identity Provider Associated Org - List that contains the organizations from which users can log in for this IdP.
- Audience string
- Identifier of the intended recipient of the token.
- Audience
Uri string - Identifier for the intended audience of the SAML Assertion.
- string
- Indicates whether authorization is granted based on group membership or user ID. Valid values are
GROUP
orUSER
. - Client
Id string - Client identifier that is assigned to an application by the Identity Provider.
- Description string
- The description of the identity provider.
- Display
Name string - Human-readable label that identifies the IdP.
- Federation
Settings stringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- Groups
Claim string - Identifier of the claim which contains IdP Group IDs in the token.
- Id string
- The provider-assigned unique ID for this managed resource.
- Identity
Provider stringId - Idp
Id string - Unique 24-hexadecimal digit string that identifies the IdP
- Idp
Type string - Type of the identity provider. Valid values are
WORKFORCE
orWORKLOAD
. - Issuer
Uri string - Identifier for the issuer of the SAML Assertion.
- Okta
Idp stringId - Unique 20-hexadecimal digit string that identifies the IdP.
- Pem
File []GetInfos Federated Settings Identity Provider Pem File Info - Protocol string
- The protocol of the identity provider. Valid values are
SAML
orOIDC
. - Request
Binding string - SAML Authentication Request Protocol binding used to send the AuthNRequest. Atlas supports the following binding values:
- HTTP POST
- HTTP REDIRECT
- Requested
Scopes []string - Scopes that MongoDB applications will request from the authorization endpoint.
- Response
Signature stringAlgorithm - Algorithm used to encrypt the IdP signature. Atlas supports the following signature algorithm values:
- SHA-1
- SHA-256
- Sso
Debug boolEnabled - Flag that indicates whether the IdP has enabled Bypass SAML Mode. Enabling this mode generates a URL that allows you bypass SAML and login to your organizations at any point. You can authenticate with this special URL only when Bypass Mode is enabled. Set this parameter to true during testing. This keeps you from getting locked out of MongoDB.
- Sso
Url string - URL of the receiver of the SAML AuthNRequest.
- Status string
- Label that indicates whether the identity provider is active. The IdP is Inactive until you map at least one domain to the IdP.
- User
Claim string - Identifier of the claim which contains the user ID in the token.
- acs
Url String - Assertion consumer service URL to which the IdP sends the SAML response.
- associated
Domains List<String> - List that contains the configured domains from which users can log in for this IdP.
- associated
Orgs List<GetFederated Settings Identity Provider Associated Org> - List that contains the organizations from which users can log in for this IdP.
- audience String
- Identifier of the intended recipient of the token.
- audience
Uri String - Identifier for the intended audience of the SAML Assertion.
- String
- Indicates whether authorization is granted based on group membership or user ID. Valid values are
GROUP
orUSER
. - client
Id String - Client identifier that is assigned to an application by the Identity Provider.
- description String
- The description of the identity provider.
- display
Name String - Human-readable label that identifies the IdP.
- federation
Settings StringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- groups
Claim String - Identifier of the claim which contains IdP Group IDs in the token.
- id String
- The provider-assigned unique ID for this managed resource.
- identity
Provider StringId - idp
Id String - Unique 24-hexadecimal digit string that identifies the IdP
- idp
Type String - Type of the identity provider. Valid values are
WORKFORCE
orWORKLOAD
. - issuer
Uri String - Identifier for the issuer of the SAML Assertion.
- okta
Idp StringId - Unique 20-hexadecimal digit string that identifies the IdP.
- pem
File List<GetInfos Federated Settings Identity Provider Pem File Info> - protocol String
- The protocol of the identity provider. Valid values are
SAML
orOIDC
. - request
Binding String - SAML Authentication Request Protocol binding used to send the AuthNRequest. Atlas supports the following binding values:
- HTTP POST
- HTTP REDIRECT
- requested
Scopes List<String> - Scopes that MongoDB applications will request from the authorization endpoint.
- response
Signature StringAlgorithm - Algorithm used to encrypt the IdP signature. Atlas supports the following signature algorithm values:
- SHA-1
- SHA-256
- sso
Debug BooleanEnabled - Flag that indicates whether the IdP has enabled Bypass SAML Mode. Enabling this mode generates a URL that allows you bypass SAML and login to your organizations at any point. You can authenticate with this special URL only when Bypass Mode is enabled. Set this parameter to true during testing. This keeps you from getting locked out of MongoDB.
- sso
Url String - URL of the receiver of the SAML AuthNRequest.
- status String
- Label that indicates whether the identity provider is active. The IdP is Inactive until you map at least one domain to the IdP.
- user
Claim String - Identifier of the claim which contains the user ID in the token.
- acs
Url string - Assertion consumer service URL to which the IdP sends the SAML response.
- associated
Domains string[] - List that contains the configured domains from which users can log in for this IdP.
- associated
Orgs GetFederated Settings Identity Provider Associated Org[] - List that contains the organizations from which users can log in for this IdP.
- audience string
- Identifier of the intended recipient of the token.
- audience
Uri string - Identifier for the intended audience of the SAML Assertion.
- string
- Indicates whether authorization is granted based on group membership or user ID. Valid values are
GROUP
orUSER
. - client
Id string - Client identifier that is assigned to an application by the Identity Provider.
- description string
- The description of the identity provider.
- display
Name string - Human-readable label that identifies the IdP.
- federation
Settings stringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- groups
Claim string - Identifier of the claim which contains IdP Group IDs in the token.
- id string
- The provider-assigned unique ID for this managed resource.
- identity
Provider stringId - idp
Id string - Unique 24-hexadecimal digit string that identifies the IdP
- idp
Type string - Type of the identity provider. Valid values are
WORKFORCE
orWORKLOAD
. - issuer
Uri string - Identifier for the issuer of the SAML Assertion.
- okta
Idp stringId - Unique 20-hexadecimal digit string that identifies the IdP.
- pem
File GetInfos Federated Settings Identity Provider Pem File Info[] - protocol string
- The protocol of the identity provider. Valid values are
SAML
orOIDC
. - request
Binding string - SAML Authentication Request Protocol binding used to send the AuthNRequest. Atlas supports the following binding values:
- HTTP POST
- HTTP REDIRECT
- requested
Scopes string[] - Scopes that MongoDB applications will request from the authorization endpoint.
- response
Signature stringAlgorithm - Algorithm used to encrypt the IdP signature. Atlas supports the following signature algorithm values:
- SHA-1
- SHA-256
- sso
Debug booleanEnabled - Flag that indicates whether the IdP has enabled Bypass SAML Mode. Enabling this mode generates a URL that allows you bypass SAML and login to your organizations at any point. You can authenticate with this special URL only when Bypass Mode is enabled. Set this parameter to true during testing. This keeps you from getting locked out of MongoDB.
- sso
Url string - URL of the receiver of the SAML AuthNRequest.
- status string
- Label that indicates whether the identity provider is active. The IdP is Inactive until you map at least one domain to the IdP.
- user
Claim string - Identifier of the claim which contains the user ID in the token.
- acs_
url str - Assertion consumer service URL to which the IdP sends the SAML response.
- associated_
domains Sequence[str] - List that contains the configured domains from which users can log in for this IdP.
- associated_
orgs Sequence[GetFederated Settings Identity Provider Associated Org] - List that contains the organizations from which users can log in for this IdP.
- audience str
- Identifier of the intended recipient of the token.
- audience_
uri str - Identifier for the intended audience of the SAML Assertion.
- str
- Indicates whether authorization is granted based on group membership or user ID. Valid values are
GROUP
orUSER
. - client_
id str - Client identifier that is assigned to an application by the Identity Provider.
- description str
- The description of the identity provider.
- display_
name str - Human-readable label that identifies the IdP.
- federation_
settings_ strid - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- groups_
claim str - Identifier of the claim which contains IdP Group IDs in the token.
- id str
- The provider-assigned unique ID for this managed resource.
- identity_
provider_ strid - idp_
id str - Unique 24-hexadecimal digit string that identifies the IdP
- idp_
type str - Type of the identity provider. Valid values are
WORKFORCE
orWORKLOAD
. - issuer_
uri str - Identifier for the issuer of the SAML Assertion.
- okta_
idp_ strid - Unique 20-hexadecimal digit string that identifies the IdP.
- pem_
file_ Sequence[Getinfos Federated Settings Identity Provider Pem File Info] - protocol str
- The protocol of the identity provider. Valid values are
SAML
orOIDC
. - request_
binding str - SAML Authentication Request Protocol binding used to send the AuthNRequest. Atlas supports the following binding values:
- HTTP POST
- HTTP REDIRECT
- requested_
scopes Sequence[str] - Scopes that MongoDB applications will request from the authorization endpoint.
- response_
signature_ stralgorithm - Algorithm used to encrypt the IdP signature. Atlas supports the following signature algorithm values:
- SHA-1
- SHA-256
- sso_
debug_ boolenabled - Flag that indicates whether the IdP has enabled Bypass SAML Mode. Enabling this mode generates a URL that allows you bypass SAML and login to your organizations at any point. You can authenticate with this special URL only when Bypass Mode is enabled. Set this parameter to true during testing. This keeps you from getting locked out of MongoDB.
- sso_
url str - URL of the receiver of the SAML AuthNRequest.
- status str
- Label that indicates whether the identity provider is active. The IdP is Inactive until you map at least one domain to the IdP.
- user_
claim str - Identifier of the claim which contains the user ID in the token.
- acs
Url String - Assertion consumer service URL to which the IdP sends the SAML response.
- associated
Domains List<String> - List that contains the configured domains from which users can log in for this IdP.
- associated
Orgs List<Property Map> - List that contains the organizations from which users can log in for this IdP.
- audience String
- Identifier of the intended recipient of the token.
- audience
Uri String - Identifier for the intended audience of the SAML Assertion.
- String
- Indicates whether authorization is granted based on group membership or user ID. Valid values are
GROUP
orUSER
. - client
Id String - Client identifier that is assigned to an application by the Identity Provider.
- description String
- The description of the identity provider.
- display
Name String - Human-readable label that identifies the IdP.
- federation
Settings StringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- groups
Claim String - Identifier of the claim which contains IdP Group IDs in the token.
- id String
- The provider-assigned unique ID for this managed resource.
- identity
Provider StringId - idp
Id String - Unique 24-hexadecimal digit string that identifies the IdP
- idp
Type String - Type of the identity provider. Valid values are
WORKFORCE
orWORKLOAD
. - issuer
Uri String - Identifier for the issuer of the SAML Assertion.
- okta
Idp StringId - Unique 20-hexadecimal digit string that identifies the IdP.
- pem
File List<Property Map>Infos - protocol String
- The protocol of the identity provider. Valid values are
SAML
orOIDC
. - request
Binding String - SAML Authentication Request Protocol binding used to send the AuthNRequest. Atlas supports the following binding values:
- HTTP POST
- HTTP REDIRECT
- requested
Scopes List<String> - Scopes that MongoDB applications will request from the authorization endpoint.
- response
Signature StringAlgorithm - Algorithm used to encrypt the IdP signature. Atlas supports the following signature algorithm values:
- SHA-1
- SHA-256
- sso
Debug BooleanEnabled - Flag that indicates whether the IdP has enabled Bypass SAML Mode. Enabling this mode generates a URL that allows you bypass SAML and login to your organizations at any point. You can authenticate with this special URL only when Bypass Mode is enabled. Set this parameter to true during testing. This keeps you from getting locked out of MongoDB.
- sso
Url String - URL of the receiver of the SAML AuthNRequest.
- status String
- Label that indicates whether the identity provider is active. The IdP is Inactive until you map at least one domain to the IdP.
- user
Claim String - Identifier of the claim which contains the user ID in the token.
Supporting Types
GetFederatedSettingsIdentityProviderAssociatedOrg
- Domain
Allow List<string>Lists - List that contains the approved domains from which organization users can log in.
- Domain
Restriction boolEnabled - Flag that indicates whether domain restriction is enabled for the connected organization.
- Identity
Provider stringId - Unique 24-hexadecimal digit string that identifies the IdP.
- Org
Id string - Unique 24-hexadecimal digit string that identifies the organization that contains your projects.
- Post
Auth List<string>Role Grants - List that contains the default roles granted to users who authenticate through the IdP in a connected organization. If you provide a postAuthRoleGrants field in the request, the array that you provide replaces the current postAuthRoleGrants.
- Role
Mappings List<GetFederated Settings Identity Provider Associated Org Role Mapping> - User
Conflicts List<GetFederated Settings Identity Provider Associated Org User Conflict>
- Domain
Allow []stringLists - List that contains the approved domains from which organization users can log in.
- Domain
Restriction boolEnabled - Flag that indicates whether domain restriction is enabled for the connected organization.
- Identity
Provider stringId - Unique 24-hexadecimal digit string that identifies the IdP.
- Org
Id string - Unique 24-hexadecimal digit string that identifies the organization that contains your projects.
- Post
Auth []stringRole Grants - List that contains the default roles granted to users who authenticate through the IdP in a connected organization. If you provide a postAuthRoleGrants field in the request, the array that you provide replaces the current postAuthRoleGrants.
- Role
Mappings []GetFederated Settings Identity Provider Associated Org Role Mapping - User
Conflicts []GetFederated Settings Identity Provider Associated Org User Conflict
- domain
Allow List<String>Lists - List that contains the approved domains from which organization users can log in.
- domain
Restriction BooleanEnabled - Flag that indicates whether domain restriction is enabled for the connected organization.
- identity
Provider StringId - Unique 24-hexadecimal digit string that identifies the IdP.
- org
Id String - Unique 24-hexadecimal digit string that identifies the organization that contains your projects.
- post
Auth List<String>Role Grants - List that contains the default roles granted to users who authenticate through the IdP in a connected organization. If you provide a postAuthRoleGrants field in the request, the array that you provide replaces the current postAuthRoleGrants.
- role
Mappings List<GetFederated Settings Identity Provider Associated Org Role Mapping> - user
Conflicts List<GetFederated Settings Identity Provider Associated Org User Conflict>
- domain
Allow string[]Lists - List that contains the approved domains from which organization users can log in.
- domain
Restriction booleanEnabled - Flag that indicates whether domain restriction is enabled for the connected organization.
- identity
Provider stringId - Unique 24-hexadecimal digit string that identifies the IdP.
- org
Id string - Unique 24-hexadecimal digit string that identifies the organization that contains your projects.
- post
Auth string[]Role Grants - List that contains the default roles granted to users who authenticate through the IdP in a connected organization. If you provide a postAuthRoleGrants field in the request, the array that you provide replaces the current postAuthRoleGrants.
- role
Mappings GetFederated Settings Identity Provider Associated Org Role Mapping[] - user
Conflicts GetFederated Settings Identity Provider Associated Org User Conflict[]
- domain_
allow_ Sequence[str]lists - List that contains the approved domains from which organization users can log in.
- domain_
restriction_ boolenabled - Flag that indicates whether domain restriction is enabled for the connected organization.
- identity_
provider_ strid - Unique 24-hexadecimal digit string that identifies the IdP.
- org_
id str - Unique 24-hexadecimal digit string that identifies the organization that contains your projects.
- post_
auth_ Sequence[str]role_ grants - List that contains the default roles granted to users who authenticate through the IdP in a connected organization. If you provide a postAuthRoleGrants field in the request, the array that you provide replaces the current postAuthRoleGrants.
- role_
mappings Sequence[GetFederated Settings Identity Provider Associated Org Role Mapping] - user_
conflicts Sequence[GetFederated Settings Identity Provider Associated Org User Conflict]
- domain
Allow List<String>Lists - List that contains the approved domains from which organization users can log in.
- domain
Restriction BooleanEnabled - Flag that indicates whether domain restriction is enabled for the connected organization.
- identity
Provider StringId - Unique 24-hexadecimal digit string that identifies the IdP.
- org
Id String - Unique 24-hexadecimal digit string that identifies the organization that contains your projects.
- post
Auth List<String>Role Grants - List that contains the default roles granted to users who authenticate through the IdP in a connected organization. If you provide a postAuthRoleGrants field in the request, the array that you provide replaces the current postAuthRoleGrants.
- role
Mappings List<Property Map> - user
Conflicts List<Property Map>
GetFederatedSettingsIdentityProviderAssociatedOrgRoleMapping
- External
Group stringName - Unique human-readable label that identifies the identity provider group to which this role mapping applies.
- Id string
- Unique 24-hexadecimal digit string that identifies this role mapping.
- Role
Assignments List<GetFederated Settings Identity Provider Associated Org Role Mapping Role Assignment> - Atlas roles and the unique identifiers of the groups and organizations associated with each role.
- External
Group stringName - Unique human-readable label that identifies the identity provider group to which this role mapping applies.
- Id string
- Unique 24-hexadecimal digit string that identifies this role mapping.
- Role
Assignments []GetFederated Settings Identity Provider Associated Org Role Mapping Role Assignment - Atlas roles and the unique identifiers of the groups and organizations associated with each role.
- external
Group StringName - Unique human-readable label that identifies the identity provider group to which this role mapping applies.
- id String
- Unique 24-hexadecimal digit string that identifies this role mapping.
- role
Assignments List<GetFederated Settings Identity Provider Associated Org Role Mapping Role Assignment> - Atlas roles and the unique identifiers of the groups and organizations associated with each role.
- external
Group stringName - Unique human-readable label that identifies the identity provider group to which this role mapping applies.
- id string
- Unique 24-hexadecimal digit string that identifies this role mapping.
- role
Assignments GetFederated Settings Identity Provider Associated Org Role Mapping Role Assignment[] - Atlas roles and the unique identifiers of the groups and organizations associated with each role.
- external_
group_ strname - Unique human-readable label that identifies the identity provider group to which this role mapping applies.
- id str
- Unique 24-hexadecimal digit string that identifies this role mapping.
- role_
assignments Sequence[GetFederated Settings Identity Provider Associated Org Role Mapping Role Assignment] - Atlas roles and the unique identifiers of the groups and organizations associated with each role.
- external
Group StringName - Unique human-readable label that identifies the identity provider group to which this role mapping applies.
- id String
- Unique 24-hexadecimal digit string that identifies this role mapping.
- role
Assignments List<Property Map> - Atlas roles and the unique identifiers of the groups and organizations associated with each role.
GetFederatedSettingsIdentityProviderAssociatedOrgRoleMappingRoleAssignment
GetFederatedSettingsIdentityProviderAssociatedOrgUserConflict
- Email
Address string - Email address of the the user that conflicts with selected domains.
- Federation
Settings stringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- First
Name string - First name of the the user that conflicts with selected domains.
- Last
Name string - Last name of the the user that conflicts with selected domains.
- User
Id string - Name of the Atlas user that conflicts with selected domains.
- Email
Address string - Email address of the the user that conflicts with selected domains.
- Federation
Settings stringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- First
Name string - First name of the the user that conflicts with selected domains.
- Last
Name string - Last name of the the user that conflicts with selected domains.
- User
Id string - Name of the Atlas user that conflicts with selected domains.
- email
Address String - Email address of the the user that conflicts with selected domains.
- federation
Settings StringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- first
Name String - First name of the the user that conflicts with selected domains.
- last
Name String - Last name of the the user that conflicts with selected domains.
- user
Id String - Name of the Atlas user that conflicts with selected domains.
- email
Address string - Email address of the the user that conflicts with selected domains.
- federation
Settings stringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- first
Name string - First name of the the user that conflicts with selected domains.
- last
Name string - Last name of the the user that conflicts with selected domains.
- user
Id string - Name of the Atlas user that conflicts with selected domains.
- email_
address str - Email address of the the user that conflicts with selected domains.
- federation_
settings_ strid - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- first_
name str - First name of the the user that conflicts with selected domains.
- last_
name str - Last name of the the user that conflicts with selected domains.
- user_
id str - Name of the Atlas user that conflicts with selected domains.
- email
Address String - Email address of the the user that conflicts with selected domains.
- federation
Settings StringId - Unique 24-hexadecimal digit string that identifies the federated authentication configuration.
- first
Name String - First name of the the user that conflicts with selected domains.
- last
Name String - Last name of the the user that conflicts with selected domains.
- user
Id String - Name of the Atlas user that conflicts with selected domains.
GetFederatedSettingsIdentityProviderPemFileInfo
- Certificates
List<Get
Federated Settings Identity Provider Pem File Info Certificate> - File
Name string - Filename of certificate
- Certificates
[]Get
Federated Settings Identity Provider Pem File Info Certificate - File
Name string - Filename of certificate
- certificates
List<Get
Federated Settings Identity Provider Pem File Info Certificate> - file
Name String - Filename of certificate
- certificates
Get
Federated Settings Identity Provider Pem File Info Certificate[] - file
Name string - Filename of certificate
- certificates
Sequence[Get
Federated Settings Identity Provider Pem File Info Certificate] - file_
name str - Filename of certificate
- certificates List<Property Map>
- file
Name String - Filename of certificate
GetFederatedSettingsIdentityProviderPemFileInfoCertificate
- not_
after str - Expiration Date.
- not_
before str - Start Date.
Package Details
- Repository
- MongoDB Atlas pulumi/pulumi-mongodbatlas
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
mongodbatlas
Terraform Provider.