GET
/
identity-providers
List Identity Providers
curl --request GET \
  --url https://{tenantDomain}/my-org/identity-providers \
  --header 'Authorization: Bearer <token>'
{
  "identity_providers": [
    {
      "id": "con_zW1UHutvkVWSWdCC",
      "name": "oidcIdp",
      "display_name": "OIDC IdP",
      "strategy": "oidc",
      "show_as_button": true,
      "assign_membership_on_login": false,
      "access_level": "full",
      "domains": [
        "mydomain.com"
      ],
      "is_enabled": true,
      "options": {
        "type": "front_channel",
        "client_id": "a8f3b2e7-5d1c-4f9a-8b0d-2e1c3a5b6f7d",
        "client_secret": "KzQp2sVxR8nTgMjFhYcEWuLoIbDvUoC6A9B1zX7yWqFjHkGrP5sQdLmNp",
        "discovery_url": "https://{yourDomain}/.well-known/openid-configuration"
      }
    },
    {
      "id": "con_zW1UHutvkVWSWdCD",
      "name": "samlIdp",
      "display_name": "Saml IdP",
      "strategy": "samlp",
      "show_as_button": true,
      "assign_membership_on_login": false,
      "access_level": "limited",
      "domains": [
        "mydomain.com"
      ],
      "is_enabled": true,
      "options": {
        "signatureAlgorithm": "rsa-sha256",
        "digestAlgorithm": "sha256",
        "protocolBinding": "HTTP-POST",
        "signSAMLRequest": true,
        "bindingMethod": "HTTP-Redirect",
        "metadataUrl": "a.metadata.url",
        "cert": "MIIDQjCCAiugAwIBAgIRAMp+cW+SgQ2Yh7fF8v8b0OQwDQYJKoZIhvcNAQELBQAw...",
        "idpInitiated": {
          "enabled": true,
          "client_id": "a8f3b2e7-5d1c-4f9a-8b0d-2e1c3a5b6f7d",
          "client_protocol": "SAML",
          "client_authorizequery": "redirect_uri=https://jwt.io&scope=openid email&response_type=token"
        }
      }
    }
  ]
}

Authorizations

Authorization
string
header
required

The access token received from the authorization server in the OAuth 2.0 flow.

Response

200
application/json

List of identity providers successfully retrieved.

The response is of type object.