Skip to content
Start here

Identity Providers

List Access identity providers
zero_trust.identity_providers.list(IdentityProviderListParams**kwargs) -> SyncV4PagePaginationArray[IdentityProviderListResponse]
GET/{accounts_or_zones}/{account_or_zone_id}/access/identity_providers
Get an Access identity provider
zero_trust.identity_providers.get(stridentity_provider_id, IdentityProviderGetParams**kwargs) -> IdentityProvider
GET/{accounts_or_zones}/{account_or_zone_id}/access/identity_providers/{identity_provider_id}
Add an Access identity provider
zero_trust.identity_providers.create(IdentityProviderCreateParams**kwargs) -> IdentityProvider
POST/{accounts_or_zones}/{account_or_zone_id}/access/identity_providers
Update an Access identity provider
zero_trust.identity_providers.update(stridentity_provider_id, IdentityProviderUpdateParams**kwargs) -> IdentityProvider
PUT/{accounts_or_zones}/{account_or_zone_id}/access/identity_providers/{identity_provider_id}
Delete an Access identity provider
zero_trust.identity_providers.delete(stridentity_provider_id, IdentityProviderDeleteParams**kwargs) -> IdentityProviderDeleteResponse
DELETE/{accounts_or_zones}/{account_or_zone_id}/access/identity_providers/{identity_provider_id}
ModelsExpand Collapse
class AzureAD:
config: Config

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

conditional_access_enabled: Optional[bool]

Should Cloudflare try to load authentication contexts from your account

directory_id: Optional[str]

Your Azure directory uuid

email_claim_name: Optional[str]

The claim name for email in the id_token response.

prompt: Optional[Literal["login", "select_account", "none"]]

Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interaction_required error. prompt=select_account interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether.

One of the following:
"login"
"select_account"
"none"
support_groups: Optional[bool]

Should Cloudflare try to load groups from your account

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class GenericOAuthConfig:
client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

One of the following:
class AzureAD:
config: Config

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

conditional_access_enabled: Optional[bool]

Should Cloudflare try to load authentication contexts from your account

directory_id: Optional[str]

Your Azure directory uuid

email_claim_name: Optional[str]

The claim name for email in the id_token response.

prompt: Optional[Literal["login", "select_account", "none"]]

Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interaction_required error. prompt=select_account interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether.

One of the following:
"login"
"select_account"
"none"
support_groups: Optional[bool]

Should Cloudflare try to load groups from your account

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessCentrify:
config: AccessCentrifyConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

centrify_account: Optional[str]

Your centrify account url

centrify_app_id: Optional[str]

Your centrify app id

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

email_claim_name: Optional[str]

The claim name for email in the id_token response.

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessFacebook:

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessGitHub:

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessGoogle:
config: AccessGoogleConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

email_claim_name: Optional[str]

The claim name for email in the id_token response.

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessGoogleApps:
config: AccessGoogleAppsConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

apps_domain: Optional[str]

Your companies TLD

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

email_claim_name: Optional[str]

The claim name for email in the id_token response.

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessLinkedin:

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessOIDC:
config: AccessOIDCConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

auth_url: Optional[str]

The authorization_endpoint URL of your IdP

certs_url: Optional[str]

The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

email_claim_name: Optional[str]

The claim name for email in the id_token response.

pkce_enabled: Optional[bool]

Enable Proof Key for Code Exchange (PKCE)

scopes: Optional[List[str]]

OAuth scopes

token_url: Optional[str]

The token_endpoint URL of your IdP

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessOkta:
config: AccessOktaConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

authorization_server_id: Optional[str]

Your okta authorization server id

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

email_claim_name: Optional[str]

The claim name for email in the id_token response.

okta_account: Optional[str]

Your okta account url

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessOnelogin:
config: AccessOneloginConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

email_claim_name: Optional[str]

The claim name for email in the id_token response.

onelogin_account: Optional[str]

Your OneLogin account url

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessPingone:
config: AccessPingoneConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

email_claim_name: Optional[str]

The claim name for email in the id_token response.

ping_env_id: Optional[str]

Your PingOne environment identifier

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessSAML:
config: AccessSAMLConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

attributes: Optional[List[str]]

A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.

email_attribute_name: Optional[str]

The attribute name for email in the SAML response.

header_attributes: Optional[List[AccessSAMLConfigHeaderAttribute]]

Add a list of attribute names that will be returned in the response header from the Access callback.

attribute_name: Optional[str]

attribute name from the IDP

header_name: Optional[str]

header that will be added on the request to the origin

idp_public_certs: Optional[List[str]]

X509 certificate to verify the signature in the SAML authentication response

issuer_url: Optional[str]

IdP Entity ID or Issuer URL

sign_request: Optional[bool]

Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.

sso_target_url: Optional[str]

URL to send the SAML authentication requests to

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessYandex:

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessOnetimepin:
config: AccessOnetimepinConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

redirect_url: Optional[str]
name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class IdentityProviderSCIMConfig:

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

enabled: Optional[bool]

A flag to enable or disable SCIM for the identity provider.

identity_update_behavior: Optional[Literal["automatic", "reauth", "no_action"]]

Indicates how a SCIM event updates a user identity used for policy evaluation. Use "automatic" to automatically update a user's identity and augment it with fields from the SCIM user resource. Use "reauth" to force re-authentication on group membership updates, user identity update will only occur after successful re-authentication. With "reauth" identities will not contain fields from the SCIM user resource. With "no_action" identities will not be changed by SCIM updates in any way and users will not be prompted to reauthenticate.

One of the following:
"automatic"
"reauth"
"no_action"
scim_base_url: Optional[str]

The base URL of Cloudflare's SCIM V2.0 API endpoint.

seat_deprovision: Optional[bool]

A flag to remove a user's seat in Zero Trust when they have been deprovisioned in the Identity Provider. This cannot be enabled unless user_deprovision is also enabled.

secret: Optional[str]

A read-only token generated when the SCIM integration is enabled for the first time. It is redacted on subsequent requests. If you lose this you will need to refresh it at /access/identity_providers/:idpID/refresh_scim_secret.

user_deprovision: Optional[bool]

A flag to enable revoking a user's session in Access and Gateway when they have been deprovisioned in the Identity Provider.

Literal["onetimepin", "azureAD", "saml", 11 more]

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

One of the following:
"onetimepin"
"azureAD"
"saml"
"centrify"
"facebook"
"github"
"google-apps"
"google"
"linkedin"
"oidc"
"okta"
"onelogin"
"pingone"
"yandex"
One of the following:
class AzureAD:
config: Config

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

conditional_access_enabled: Optional[bool]

Should Cloudflare try to load authentication contexts from your account

directory_id: Optional[str]

Your Azure directory uuid

email_claim_name: Optional[str]

The claim name for email in the id_token response.

prompt: Optional[Literal["login", "select_account", "none"]]

Indicates the type of user interaction that is required. prompt=login forces the user to enter their credentials on that request, negating single-sign on. prompt=none is the opposite. It ensures that the user isn't presented with any interactive prompt. If the request can't be completed silently by using single-sign on, the Microsoft identity platform returns an interaction_required error. prompt=select_account interrupts single sign-on providing account selection experience listing all the accounts either in session or any remembered account or an option to choose to use a different account altogether.

One of the following:
"login"
"select_account"
"none"
support_groups: Optional[bool]

Should Cloudflare try to load groups from your account

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessCentrify:
config: AccessCentrifyConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

centrify_account: Optional[str]

Your centrify account url

centrify_app_id: Optional[str]

Your centrify app id

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

email_claim_name: Optional[str]

The claim name for email in the id_token response.

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessFacebook:

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessGitHub:

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessGoogle:
config: AccessGoogleConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

email_claim_name: Optional[str]

The claim name for email in the id_token response.

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessGoogleApps:
config: AccessGoogleAppsConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

apps_domain: Optional[str]

Your companies TLD

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

email_claim_name: Optional[str]

The claim name for email in the id_token response.

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessLinkedin:

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessOIDC:
config: AccessOIDCConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

auth_url: Optional[str]

The authorization_endpoint URL of your IdP

certs_url: Optional[str]

The jwks_uri endpoint of your IdP to allow the IdP keys to sign the tokens

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

email_claim_name: Optional[str]

The claim name for email in the id_token response.

pkce_enabled: Optional[bool]

Enable Proof Key for Code Exchange (PKCE)

scopes: Optional[List[str]]

OAuth scopes

token_url: Optional[str]

The token_endpoint URL of your IdP

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessOkta:
config: AccessOktaConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

authorization_server_id: Optional[str]

Your okta authorization server id

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

email_claim_name: Optional[str]

The claim name for email in the id_token response.

okta_account: Optional[str]

Your okta account url

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessOnelogin:
config: AccessOneloginConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

email_claim_name: Optional[str]

The claim name for email in the id_token response.

onelogin_account: Optional[str]

Your OneLogin account url

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessPingone:
config: AccessPingoneConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

claims: Optional[List[str]]

Custom claims

client_id: Optional[str]

Your OAuth Client ID

client_secret: Optional[str]

Your OAuth Client Secret

email_claim_name: Optional[str]

The claim name for email in the id_token response.

ping_env_id: Optional[str]

Your PingOne environment identifier

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessSAML:
config: AccessSAMLConfig

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

attributes: Optional[List[str]]

A list of SAML attribute names that will be added to your signed JWT token and can be used in SAML policy rules.

email_attribute_name: Optional[str]

The attribute name for email in the SAML response.

header_attributes: Optional[List[AccessSAMLConfigHeaderAttribute]]

Add a list of attribute names that will be returned in the response header from the Access callback.

attribute_name: Optional[str]

attribute name from the IDP

header_name: Optional[str]

header that will be added on the request to the origin

idp_public_certs: Optional[List[str]]

X509 certificate to verify the signature in the SAML authentication response

issuer_url: Optional[str]

IdP Entity ID or Issuer URL

sign_request: Optional[bool]

Sign the SAML authentication request with Access credentials. To verify the signature, use the public key from the Access certs endpoints.

sso_target_url: Optional[str]

URL to send the SAML authentication requests to

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class AccessYandex:

The configuration parameters for the identity provider. To view the required parameters for a specific provider, refer to our developer documentation.

name: str

The name of the identity provider, shown to users on the login page.

The type of identity provider. To determine the value for a specific provider, refer to our developer documentation.

id: Optional[str]

UUID.

maxLength36
scim_config: Optional[IdentityProviderSCIMConfig]

The configuration settings for enabling a System for Cross-Domain Identity Management (SCIM) with the identity provider.

class IdentityProviderDeleteResponse:
id: Optional[str]

UUID.

maxLength36

Identity ProvidersSCIM

Identity ProvidersSCIMGroups

List SCIM Group resources
zero_trust.identity_providers.scim.groups.list(stridentity_provider_id, GroupListParams**kwargs) -> SyncV4PagePaginationArray[ZeroTrustGroup]
GET/accounts/{account_id}/access/identity_providers/{identity_provider_id}/scim/groups

Identity ProvidersSCIMUsers

List SCIM User resources
zero_trust.identity_providers.scim.users.list(stridentity_provider_id, UserListParams**kwargs) -> SyncV4PagePaginationArray[AccessUser]
GET/accounts/{account_id}/access/identity_providers/{identity_provider_id}/scim/users