Skip to main content

Update Identity Provider

Update Identity Provider

Path Parameters
    workspaceName string required
    providerAlias string required
Header Parameters
    Authentication string
    Example: Bearer {{token}}

Request Body

aliasstring

The app identifier registered with the identity provider.

internalIdstring

The Id of the Identity provider

providerIdstring

Id of the Identity provider

enabledboolean

Enable/disable this identity provider.

updateProfileFirstLoginModestring

It will update the profile details in identity provider when user logged in for the first time.

trustEmailboolean

If enabled, email provided by this provider is not verified even if verification is enabled for the workspace.

storeTokenboolean

true/false if tokens must be stored after authenticating users.

addReadTokenRoleOnCreateboolean

Enable/disable if new users can read any stored tokens. This assigns the broker.read-token role.

authenticateByDefaultboolean

If it's enabled it will authenticate when page loads.

linkOnlyfalse

If true, users cannot log in through this provider. They can only link to this provider. This is useful if you don't want to allow login from the provider, but want to integrate with a provider

firstBrokerLoginFlowAliasstring

Name of the first broker login flow name

configobject

Configuration for the identity provider

Sample Request Body
{
"alias": "keycloak-oidc-2",
"internalId": "0df24d90-d39e-4e02-ab3d-7150efa40b1d",
"providerId": "keycloak-oidc",
"enabled": true,
"updateProfileFirstLoginMode": "on",
"trustEmail": false,
"storeToken": false,
"addReadTokenRoleOnCreate": false,
"authenticateByDefault": false,
"linkOnly": false,
"firstBrokerLoginFlowAlias": "first broker login",
"config": {}
}

Response

aliasstring

The app identifier registered with the identity provider.

internalIdstring

The Id of the Identity provider

providerIdstring

Id of the Identity provider

enabledboolean

Enable/disable this identity provider.

updateProfileFirstLoginModestring

It will update the profile details in identity provider when user logged in for the first time.

trustEmailboolean

If enabled, email provided by this provider is not verified even if verification is enabled for the workspace.

storeTokenboolean

true/false if tokens must be stored after authenticating users.

addReadTokenRoleOnCreateboolean

Enable/disable if new users can read any stored tokens. This assigns the broker.read-token role.

authenticateByDefaultboolean

If it's enabled it will authenticate when page loads.

linkOnlyfalse

If true, users cannot log in through this provider. They can only link to this provider. This is useful if you don't want to allow login from the provider, but want to integrate with a provider

firstBrokerLoginFlowAliasstring

Name of the first broker login flow name

configobject

Configuration for the identity provider

Sample Response
{
"alias": "keycloak-oidc-2",
"internalId": "0df24d90-d39e-4e02-ab3d-7150efa40b1d",
"providerId": "keycloak-oidc",
"enabled": true,
"updateProfileFirstLoginMode": "on",
"trustEmail": false,
"storeToken": false,
"addReadTokenRoleOnCreate": false,
"authenticateByDefault": false,
"linkOnly": false,
"firstBrokerLoginFlowAlias": "first broker login",
"config": {}
}
HTTP STATUS CODE SUMMARY
200 - OKSuccessfully done.
201 - OKSuccessfully created.
400 - Bad RequestThe request was unacceptable, often due to missing a required parameter.
401 - UnauthorizedUnauthorized access try with correct access.
402 - Request FailedThe parameters were valid but the request failed.
403 - ForbiddenThe Application doesn't have permissions to perform the request.
404 - Not FoundThe requested resource doesn't exist
500 - Server ErrorsSomething went wrong on ezto auth's end. (These are rare.)
503 - Server ErrorsService temporarily unavailable

Loading...