createMspSso

POST https://{{host}}/api/v1/msps/:msp_id/ssos

Body Parameters

NameTypeDescription
namestringname
issuerstringIDP issuer URL
idp_certstringIDP Cert (used to verify the signed response)
idp_sso_urlstringIDP Single-Sign-On URL
nameid_formatstringemail (default) / unspecified
ignore_unmatched_rolesbooleanignore any unmatched roles provided in assertion. By default, an assertion is treated as invalid for any unmatched role
default_rolestringdefault role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
role_attr_fromstringoptional, name of the attribute in SAML Assertion to extract role from (defaults to Role)
role_attr_extractionstringoptional, user defined role parsing scheme. See Supported Role Parsing Schemes
custom_logout_urlstringoptional, a URL we will redirect the user after user logout from Mist (for some IdP which supports a custom logout URL that is different from SP-initiated SLO process)

Supported Role Parsing Schemes

NameScheme
cn
  • The expected role attribute format in SAML Assertion is “CN=cn,OU=ou1,OU=ou2,…”

  • CN (the key) is case insensitive and exactly 1 CN is expected (or the entire entry will be ignored)

  • E.g. if role attribute is “CN=cn,OU=ou1,OU=ou2” then parsed role value is “cn”

Request Body

{"name"=>"onelogin", "issuer"=>"https://app.onelogin.com/saml/metadata/138130", "idp_cert"=>"-----BEGIN CERTIFICATE-----\nMIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE\n-----END CERTIFICATE-----", "idp_sign_algo"=>"sha256", "idp_sso_url"=>"https://yourorg.onelogin.com/trust/saml2/http-post/sso/138130", "nameid_format"=>"email", "ignore_unmatched_roles"=>false, "default_role"=>nil, "custom_logout_url"=>"https://6.4.5.7/saml/idp/SingleLogoutService.php?param1=value1"}

HEADERS

KeyDatatypeRequiredDescription
Acceptstring
X-CSRFTokenstring
Content-Typestring