You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Access expiration date in Unix timestamp (select 0 for access without expiry date)
[optional][default to 0]
allowed_redirect_uri
Array<String>
Allowed redirect URIs after the authentication
[optional]
audit_logs_claims
Array<String>
Subclaims to include in audit logs, e.g "--audit-logs-claims email --audit-logs-claims username"
[optional]
bound_ips
Array<String>
A CIDR whitelist with the IPs that the access is restricted to
[optional]
delete_protection
String
Protection from accidental deletion of this object [true/false]
[optional]
description
String
Auth Method description
[optional]
force_sub_claims
Boolean
if true: enforce role-association must include sub claims
[optional]
gw_bound_ips
Array<String>
A CIDR whitelist with the GW IPs that the access is restricted to
[optional]
idp_metadata_url
String
IDP metadata url
[optional]
idp_metadata_xml_data
String
IDP metadata xml data
[optional]
json
Boolean
Set output format to JSON
[optional][default to false]
jwt_ttl
Integer
Jwt TTL
[optional][default to 0]
name
String
Auth Method name
new_name
String
Auth Method new name
[optional]
product_type
Array<String>
Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]
[optional]
subclaims_delimiters
Array<String>
A list of additional sub claims delimiters (relevant only for SAML, OIDC, OAuth2/JWT)
[optional]
token
String
Authentication token (see `/auth` and `/configure`)
[optional]
uid_token
String
The universal identity token, Required only for universal_identity authentication
[optional]
unique_identifier
String
A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a "sub claim" that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.