curl --request PATCH \
--url https://bloodhound.specterops.io/openapi.json/api/v2/sso-providers/{sso_provider_id} \
--header 'Authorization: Bearer <token>' \
--header 'Content-Type: multipart/form-data' \
--form 'name=<string>' \
--form metadata='@example-file' \
--form config.auto_provision.enabled=true \
--form config.auto_provision.default_role_id=3 \
--form config.auto_provision.role_provision=false{
"data": {
"id": 123,
"created_at": "2023-11-07T05:31:56Z",
"updated_at": "2023-11-07T05:31:56Z",
"deleted_at": {
"time": "2023-11-07T05:31:56Z",
"valid": true
},
"name": "<string>",
"display_name": "<string>",
"idp_issuer_uri": "<string>",
"idp_sso_uri": "<string>",
"principal_attribute_mappings": [
"<string>"
],
"sp_issuer_uri": "<string>",
"sp_sso_uri": "<string>",
"sp_metadata_uri": "<string>",
"sp_acs_uri": "<string>",
"sso_provider_id": {
"int32": 123,
"valid": true
}
}
}Updates an existing SSO provider. Updating saml provider requires a “multipart/form-data” body. Updating oidc provider requires “application/json” body. Response is respective provider
curl --request PATCH \
--url https://bloodhound.specterops.io/openapi.json/api/v2/sso-providers/{sso_provider_id} \
--header 'Authorization: Bearer <token>' \
--header 'Content-Type: multipart/form-data' \
--form 'name=<string>' \
--form metadata='@example-file' \
--form config.auto_provision.enabled=true \
--form config.auto_provision.default_role_id=3 \
--form config.auto_provision.role_provision=false{
"data": {
"id": 123,
"created_at": "2023-11-07T05:31:56Z",
"updated_at": "2023-11-07T05:31:56Z",
"deleted_at": {
"time": "2023-11-07T05:31:56Z",
"valid": true
},
"name": "<string>",
"display_name": "<string>",
"idp_issuer_uri": "<string>",
"idp_sso_uri": "<string>",
"principal_attribute_mappings": [
"<string>"
],
"sp_issuer_uri": "<string>",
"sp_sso_uri": "<string>",
"sp_metadata_uri": "<string>",
"sp_acs_uri": "<string>",
"sso_provider_id": {
"int32": 123,
"valid": true
}
}
}Authorization: Bearer $JWT_TOKEN
Prefer header, used to specify a custom timeout in seconds using the wait parameter as per RFC7240.
SSO Provider ID
Name of the new SAML provider.
Metadata XML file.
boolean that, if enabled, allows SSO providers to auto provision bloodhound users on initial login
"true"
default role id for the user created from SSO provider auto provision
"3"
boolean that, if enabled, allows sso providers to manage roles for newly created users
"false"
OK
Show child attributes