Skip to content

Latest commit

 

History

History
42 lines (38 loc) · 5.55 KB

SamlConfig.md

File metadata and controls

42 lines (38 loc) · 5.55 KB

SamlConfig

Properties

Name Type Description Notes
can map[string,bool] Operations the current user is able to perform on this object [optional]
enabled bool Enable/Disable Saml authentication for the server [optional]
idp_cert string Identity Provider Certificate (provided by IdP) [optional]
idp_url string Identity Provider Url (provided by IdP) [optional]
idp_issuer string Identity Provider Issuer (provided by IdP) [optional]
idp_audience string Identity Provider Audience (set in IdP config). Optional in Looker. Set this only if you want Looker to validate the audience value returned by the IdP. [optional]
allowed_clock_drift int Count of seconds of clock drift to allow when validating timestamps of assertions. [optional]
user_attribute_map_email string Name of user record attributes used to indicate email address field [optional]
user_attribute_map_first_name string Name of user record attributes used to indicate first name [optional]
user_attribute_map_last_name string Name of user record attributes used to indicate last name [optional]
new_user_migration_types string Merge first-time saml login to existing user account by email addresses. When a user logs in for the first time via saml this option will connect this user into their existing account by finding the account with a matching email address by testing the given types of credentials for existing users. Otherwise a new user account will be created for the user. This list (if provided) must be a comma separated list of string like 'email,ldap,google' [optional]
alternate_email_login_allowed bool Allow alternate email-based login via '/login/email' for admins and for specified users with the 'login_special_email' permission. This option is useful as a fallback during ldap setup, if ldap config problems occur later, or if you need to support some users who are not in your ldap directory. Looker email/password logins are always disabled for regular users when ldap is enabled. [optional]
test_slug string Slug to identify configurations that are created in order to run a Saml config test [optional]
modified_at string When this config was last modified [optional]
modified_by string User id of user who last modified this config [optional]
default_new_user_roles \Swagger\Client\Model\Role[] (Read-only) Roles that will be applied to new users the first time they login via Saml [optional]
default_new_user_groups \Swagger\Client\Model\Group[] (Read-only) Groups that will be applied to new users the first time they login via Saml [optional]
default_new_user_role_ids string[] (Write-Only) Array of ids of roles that will be applied to new users the first time they login via Saml [optional]
default_new_user_group_ids string[] (Write-Only) Array of ids of groups that will be applied to new users the first time they login via Saml [optional]
set_roles_from_groups bool Set user roles in Looker based on groups from Saml [optional]
groups_attribute string Name of user record attributes used to indicate groups. Used when 'groups_finder_type' is set to 'grouped_attribute_values' [optional]
groups \Swagger\Client\Model\SamlGroupRead[] (Read-only) Array of mappings between Saml Groups and Looker Roles [optional]
groups_with_role_ids \Swagger\Client\Model\SamlGroupWrite[] (Read/Write) Array of mappings between Saml Groups and arrays of Looker Role ids [optional]
auth_requires_role bool Users will not be allowed to login at all unless a role for them is found in Saml if set to true [optional]
user_attributes \Swagger\Client\Model\SamlUserAttributeRead[] (Read-only) Array of mappings between Saml User Attributes and Looker User Attributes [optional]
user_attributes_with_ids \Swagger\Client\Model\SamlUserAttributeWrite[] (Read/Write) Array of mappings between Saml User Attributes and arrays of Looker User Attribute ids [optional]
groups_finder_type string Identifier for a strategy for how Looker will find groups in the SAML response. One of ['grouped_attribute_values', 'individual_attributes'] [optional]
groups_member_value string Value for group attribute used to indicate membership. Used when 'groups_finder_type' is set to 'individual_attributes' [optional]
bypass_login_page bool Bypass the login page when user authentication is required. Redirect to IdP immediately instead. [optional]
allow_normal_group_membership bool Allow SAML auth'd users to be members of non-reflected Looker groups. If 'false', user will be removed from non-reflected groups on login. [optional]
allow_roles_from_normal_groups bool SAML auth'd users will inherit roles from non-reflected Looker groups. [optional]
allow_direct_roles bool Allows roles to be directly assigned to SAML auth'd users. [optional]
url string Link to get this item [optional]

[Back to Model list] [Back to API list] [Back to README]