Update Partner

put

/oam/services/rest/11.1.2.0.0/fed/admin/trustedpartners/sp/{partnerName}

A specific SP partner resource is updated by this method, where partnerName is the name of the partner to be updated.

Request

Supported Media Types
Path Parameters
Body ()
SP Partner details
Root Schema : spPartnerData
Type: object
Data-Set of SP Partner
Show Source
  • Allowed Values: [ "facloud", "onpremise" ]
    indicates the type of Federation partner
    • facloud: represents an FA SaaS Cloud OIF server
    • onpremise: represents a customer owned Federation server
  • the SAML 2.0 Assertion Consumer service URL where the user will be redirected by the IdP with a SAML 2.0 Assertion
  • indicates a list of optional attributes (if missing, then the attribute will not be sent)
  • indicates the SAML Attribute name to use in the SAML 2.0 Assertion when including the user's email (if missing, then the attribute name will not be set to email)
  • the Base64 encoded X.509 Encryption Certificate used by the SP to decrypt encrypted SAML messages
  • indicates the Keystore access template id to be used in encryption certificate. The default value is osts_encryption if this parameter has not been set
  • indicates the SAML Attribute name to use in the SAML 2.0 Assertion when including the user's first name (if missing, then the attribute name will not be set to lastname)
  • Allowed Values: [ "true", "false" ]
    indicates whether or not new keys and corresponding self signed certificates should be generated for SAML operations, also indicates if new cryptographic materials should be re-generated
  • indicates the SAML Attribute name to use in the SAML 2.0 Assertion when including the user's last name (if missing, then the attribute name will not be set to firstname)
  • the URL that will be used by the IdP to redirect the user to the SP for the Logout Redirect profile with the SAML
  • the URL that will be used by the IdP to redirect the user to the SP for the Logout Redirect profile with the SAML LogoutResponse
  • the Base64 encoded metadata of the SP server that will be sent to the IdP. If not specified, metadataURL will be used
  • URL where the SP metadata can be downloaded
  • Allowed Values: [ "emailaddress", "unspecified" ]
    the NameID format used during Federation SSO. If emailaddress, then the NameID value of an Assertion created by the IdP will contain the user's email address; if unspecified, then the NameID value of an Assertion created by the IdP will contain the user's ID
  • the partner name to be used
  • Allowed Values: [ "sp" ]
    Partner Type
  • boolean indicating if the call is to perform a pre-verification check. If true, the service will need to ensure the method can be invoked before the changes are performed in a subsequent call
  • the SP's ProviderID
  • indicates SAML signature hashing algorithm to be used. Possible values are SHA-1 or SHA-256. The default value is SHA-1 if this parameter has not been set
  • the Base64 encoded X.509 Signing Certificate used by the SP to sign messages
  • indicates the Keystore access template id to be used in signing certificate. The default value is osts_signing if this parameter has not been set
  • Allowed Values: [ "httppost", "artifact" ]
    the SAML 2.0 SSO profile to use
  • SSO SOAP URL for the SP Partner
  • the SAML 2.0 Single Sign-On service URL where the user will be redirected by the SP with a SAML 2.0 AuthnRequest with Redirect profile
  • indicates if a static attribute should be sent and how it should be referenced (if missing, then the attribute will not be sent). staticAttrName and staticAttrValue are required
  • indicates if a static attribute should be sent and what value should be used (if missing, then the attribute will not be sent). staticAttrName and staticAttrValue are required
  • the customers' tenant name in the PaaS (only used if OIF is multi tenant enabled)
  • : the customers' tenant URL path. (only used if OIF is multi tenant enabled; required)
  • indicates the SAML Attribute name to use in the SAML 2.0 Assertion when including the userID (if missing, then the attribute name will not be set to username)
  • indicates the validity in days of the self signed certificates

Response

Supported Media Types

200 Response

OK
Body ()
Status Response
Root Schema : statusResponse
Type: object
Status Response
Show Source

400 Response

Bad Request.

500 Response

INTERNAL SERVER ERROR.