Create Partner

post

/oam/services/rest/11.1.2.0.0/fed/admin/trustedidppartners

The REST endpoint service request is used to create trusted IDP Partner using FORM data.

Request

Supported Media Types
Form Parameters
  • indicates if mapping of the Assertion will be done via a SAML Attribute. This parameter indicates the LDAP attribute to use. attributeLDAP and attributeSAML are both required for SAML attribute mapping to work. If specified, nameIDFormat is ignored for assertion mapping
  • indicates if mapping of the Assertion will be done via a SAML Attribute. This parameter indicates the SAML attribute to use. attributeLDAP and attributeSAML are both required for SAML attribute mapping to work. If specified, nameIDFormat is ignored for assertion mapping
  • the Base64 encoded X.509 Encryption Certificate used by the IdP to decrypt encrypted SAML messages
  • the default relay state to set in that IdP partner entry
  • indicates whether or not new keys and corresponding self signed certificates should be generated for SAML operations, indicates if new cryptographic materials should be re-generated
    Allowed Values: [ "true", "false" ]
  • the partner name to be used
  • the IdP's ProviderID
  • the URL that will be used by the SP to redirect the user to the IdP for the Logout Redirect profile with the SAML
  • the URL that will be used by the SP to redirect the user to the IdP for the Logout Redirect profile with the SAML LogoutResponse
  • the Base64 encoded metadata of the IdP server that will be sent to the SP. If not specified, idpmetadataurl will be used. If missing, the assertionConsumerServiceArtifactURL, assertionConsumerServicePOSTURL, logoutRequestURL, logoutResponseURL, signingCert and encryptionCert fields must be set, otherwise those fields will be ignored
  • URL where the IdP metadata can be downloaded
  • the NameID format used during Federation SSO, emailaddress or unspecified. If emailaddress, then the NameID value of an Assertion created by the IdP will contain the user's email address; if unspecified, then the NameID value of an Assertion created by the IdP will contain the user's ID
    Allowed Values: [ "emailaddress", "unspecified" ]
  • will test the data-set of idp partner but will not create the actual partner if set to 'true'
    Default Value: false
  • the Base64 encoded X.509 Signing Certificate used by the IdP to sign messages or assertions
  • the customer's tenant name in the targeted service. For example, the customer ACME Corp might be known in PaaS as acme and in Taleo as acmecorp. (only used if OIF is multi tenant enabled)
  • the customers' tenant URL path. (only used if OIF is multi tenant enabled)
  • the SAML 2.0 SSO profile to use
    Allowed Values: [ "artifact", "httppost" ]
  • the SAML 2.0 Single Sign-On service SOAP URL where the SP will send a SOAP request during the SSO Artifact profile
  • the SAML 2.0 Single Sign-On service URL where the user will be redirected by the SP with a SAML 2.0 AuthnRequest with Redirect profile
  • the SHA-1 hash of the ProviderID. It is a mandatory field in case of artifact response.
  • indicates the validity in days of the self signed certificates

Response

Supported Media Types

200 Response

OK
Body ()
Status Response
Root Schema : statusResponse
Type: object
Status Response
Show Source

400 Response

Bad Request.

500 Response

INTERNAL SERVER ERROR.