Update Identity Provider
Update Identity Provider
Path Parameters
Header Parameters
Request Body
alias
string
The app identifier registered with the identity provider.
internalId
string
The Id of the Identity provider
providerId
string
Id of the Identity provider
enabled
boolean
Enable/disable this identity provider.
updateProfileFirstLoginMode
string
It will update the profile details in identity provider when user logged in for the first time.
trustEmail
boolean
If enabled, email provided by this provider is not verified even if verification is enabled for the workspace.
storeToken
boolean
true/false if tokens must be stored after authenticating users.
addReadTokenRoleOnCreate
boolean
Enable/disable if new users can read any stored tokens. This assigns the broker.read-token role.
authenticateByDefault
boolean
If it's enabled it will authenticate when page loads.
linkOnly
false
If true, users cannot log in through this provider. They can only link to this provider. This is useful if you don't want to allow login from the provider, but want to integrate with a provider
firstBrokerLoginFlowAlias
string
Name of the first broker login flow name
config
object
Configuration for the identity provider
{
"alias": "keycloak-oidc-2",
"internalId": "0df24d90-d39e-4e02-ab3d-7150efa40b1d",
"providerId": "keycloak-oidc",
"enabled": true,
"updateProfileFirstLoginMode": "on",
"trustEmail": false,
"storeToken": false,
"addReadTokenRoleOnCreate": false,
"authenticateByDefault": false,
"linkOnly": false,
"firstBrokerLoginFlowAlias": "first broker login",
"config": {}
}
Response
alias
string
The app identifier registered with the identity provider.
internalId
string
The Id of the Identity provider
providerId
string
Id of the Identity provider
enabled
boolean
Enable/disable this identity provider.
updateProfileFirstLoginMode
string
It will update the profile details in identity provider when user logged in for the first time.
trustEmail
boolean
If enabled, email provided by this provider is not verified even if verification is enabled for the workspace.
storeToken
boolean
true/false if tokens must be stored after authenticating users.
addReadTokenRoleOnCreate
boolean
Enable/disable if new users can read any stored tokens. This assigns the broker.read-token role.
authenticateByDefault
boolean
If it's enabled it will authenticate when page loads.
linkOnly
false
If true, users cannot log in through this provider. They can only link to this provider. This is useful if you don't want to allow login from the provider, but want to integrate with a provider
firstBrokerLoginFlowAlias
string
Name of the first broker login flow name
config
object
Configuration for the identity provider
{
"alias": "keycloak-oidc-2",
"internalId": "0df24d90-d39e-4e02-ab3d-7150efa40b1d",
"providerId": "keycloak-oidc",
"enabled": true,
"updateProfileFirstLoginMode": "on",
"trustEmail": false,
"storeToken": false,
"addReadTokenRoleOnCreate": false,
"authenticateByDefault": false,
"linkOnly": false,
"firstBrokerLoginFlowAlias": "first broker login",
"config": {}
}
HTTP STATUS CODE SUMMARY | ||
---|---|---|
200 - OK | Successfully done. | |
201 - OK | Successfully created. | |
400 - Bad Request | The request was unacceptable, often due to missing a required parameter. | |
401 - Unauthorized | Unauthorized access try with correct access. | |
402 - Request Failed | The parameters were valid but the request failed. | |
403 - Forbidden | The Application doesn't have permissions to perform the request. | |
404 - Not Found | The requested resource doesn't exist | |
500 - Server Errors | Something went wrong on ezto auth's end. (These are rare.) | |
503 - Server Errors | Service temporarily unavailable |