Google Identity Platform Tenant Inbound SAML Config
This page shows how to write Terraform for Identity Platform Tenant Inbound SAML Config and write them securely.
google_identity_platform_tenant_inbound_saml_config (Terraform)
The Tenant Inbound SAML Config in Identity Platform can be configured in Terraform with the resource name google_identity_platform_tenant_inbound_saml_config
. The following sections describe how to use the resource and its parameters.
Example Usage from GitHub
An example could not be found in GitHub.
Parameters
-
display_name
required - string
Human friendly display name.
-
enabled
optional - bool
If this config allows users to sign in with the provider.
The name of the InboundSamlConfig resource. Must start with 'saml.' and can only have alphanumeric characters, hyphens, underscores or periods. The part after 'saml.' must also start with a lowercase letter, end with an alphanumeric character, and have at least 2 characters.
The name of the tenant where this inbound SAML config resource exists
-
idp_config
list block-
idp_entity_id
required - string
Unique identifier for all SAML entities
-
sign_request
optional - bool
Indicates if outbounding SAMLRequest should be signed.
-
sso_url
required - string
URL to send Authentication request to.
-
idp_certificates
list block-
x509_certificate
optional - string
The x509 certificate
-
-
-
sp_config
list block-
callback_uri
required - string
Callback URI where responses from IDP are handled. Must start with 'https://'.
-
sp_certificates
optional computed - list of object
The IDP's certificate data to verify the signature in the SAMLResponse issued by the IDP.
-
x509_certificate
- string -
sp_entity_id
required - string
Unique identifier for all SAML entities.
-
-
timeouts
single block
Explanation in Terraform Registry
Inbound SAML configuration for a Identity Toolkit tenant. You must enable the Google Identity Platform in the marketplace prior to using this resource.