Get Single Sign-On Properties
get
/rest/v19/ssoConfiguration
This endpoint is used to retrieve SSO properties.
Request
There are no request parameters for this operation.
Back to TopResponse
Supported Media Types
- application/json
Default Response
Single Sign-On Configuration properties.
Root Schema : sso-getResponse
Type:
Show Source
object-
idProviderCertificate:
string
Title:
Identity Provider CertificateIdentity Provider Certificate -
requestedNameIdentifierFormat:
string
Title:
SAML Requested Name Identifier FormatEach IDP supports different NameID formats, which can be found in the IDP configuration. If the field is left blank, the setting defaults to using the transient format. -
samlAttributeName:
string
Title:
SAML User ID Attribute NameWhen the 'idLocationAttribute' option is selected, the Attribute Name field appears. Enter the value that contains the User ID. -
samlIdpUrl:
string
Title:
SAML Identity Provider URLSAML Identity Provider URL -
samlIssuerUrl:
string
Title:
SAML Issuer URLOracle CPQ Issuer URL -
samlLogoutUrl:
string
Title:
SAML Logout URLWhen an Oracle CPQ user is logged out (via a session timeout, or by the user manually logging out), the user will be redirected to the SAML Logout URL. If a SAML Logout URL is not defined, the user will land on the CPQ login screen after being logged out. -
samlNeedRequestSigned:
string
Title:
Require Signed RequestRequire Signed Request, allowed values: 'true', 'false'. A signed request is a message sent from an applicant to a certificate authority to apply for a digital identity certificate. This helps establish a level of trust to ensure when CPQ makes a request to an IDP, the IDP can verify that it is actually CPQ, and not an attacker disguised as CPQ. When 'true' the Request Keystore StorePass and Request Keystore KeyPass SAML requests are provided to the IDP. -
samlRequestKeyStore:
string
Title:
SAML Request KeystoreSAML Request Keystore -
samlSingleLogoutEndpoint:
string
Title:
SAML Single Logout EndpointSAML Single Logout Endpoint -
samlSingleLogoutResponseEndpoint:
string
Title:
SAML Single Logout Response EndpointSAML Single Logout Response Endpoint -
samlUserIdLocation:
string
Title:
SAML User ID LocationThe SAML user Id location specifies in which of two locations in the assertion a user will be identified. In theor in an , for the specified of the assertion. Allowed values: 'idLocationSubject' and 'idLocationAttribute'. -
samlUserIdType:
string
Title:
SAML User ID TypeThe SAML user Id type specifies which of two identifiers an assertion contains when being sent to CPQ: The users CPQ username or an External ID from the User Object. Allowed values: 'assertionTypeUsername' and 'assertionTypeExternal'. -
ssoMethod:
string
Title:
Single Sign-On MethodSingle Sign-On Method, allowed methods: None, Federated Authentication, Remote Webservices, and Federated and Remote.
Examples
The following example shows how to retrieve an SSO configuration by submitting a GET request to the REST resource using cURL. For more information about cURL, see Use cURL.
curl - X GET -H "Authorization: Bearer <token>" - H "Content-type: application/json" https://sitename.oracle.com/rest/v19/ssoConfiguration
Response Body Sample
{
"ssoMethod": "Federated and Remote",
"samlIssuerUrl": "BigMachines Issuer URL value",
"idProviderCertificate": "base64encodecertvalue",
"samlNeedRequestSigned": "true",
"samlRequestKeyStore": "base64encodedcertvalue",
"requestedNameIdentifierFormat": "identifier format value",
"samlIdpUrl": "identity provided url value",
"samlLogoutUrl": "logout url",
"samlSingleLogoutEndpoint": "logout endpoint",
"samlSingleLogoutResponseEndpoint": "logout response endpoint",
"samlUserIdType": "assertionTypeUsername",
"samlUserIdLocation": "idLocationAttribute",
"samlAttributeName": "AttributeValue"
}