keycloak.saml.Client
Explore with Pulumi AI
Allows for creating and managing Keycloak clients that use the SAML protocol.
Clients are entities that can use Keycloak for user authentication. Typically, clients are applications that redirect users to Keycloak for authentication in order to take advantage of Keycloak’s user sessions for SSO.
Create Client Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Client(name: string, args: ClientArgs, opts?: CustomResourceOptions);
@overload
def Client(resource_name: str,
args: ClientArgs,
opts: Optional[ResourceOptions] = None)
@overload
def Client(resource_name: str,
opts: Optional[ResourceOptions] = None,
client_id: Optional[str] = None,
realm_id: Optional[str] = None,
idp_initiated_sso_relay_state: Optional[str] = None,
signing_certificate: Optional[str] = None,
canonicalization_method: Optional[str] = None,
authentication_flow_binding_overrides: Optional[ClientAuthenticationFlowBindingOverridesArgs] = None,
client_signature_required: Optional[bool] = None,
description: Optional[str] = None,
include_authn_statement: Optional[bool] = None,
encrypt_assertions: Optional[bool] = None,
encryption_certificate: Optional[str] = None,
extra_config: Optional[Mapping[str, str]] = None,
force_name_id_format: Optional[bool] = None,
force_post_binding: Optional[bool] = None,
front_channel_logout: Optional[bool] = None,
full_scope_allowed: Optional[bool] = None,
valid_redirect_uris: Optional[Sequence[str]] = None,
base_url: Optional[str] = None,
enabled: Optional[bool] = None,
login_theme: Optional[str] = None,
logout_service_post_binding_url: Optional[str] = None,
logout_service_redirect_binding_url: Optional[str] = None,
master_saml_processing_url: Optional[str] = None,
name: Optional[str] = None,
name_id_format: Optional[str] = None,
assertion_consumer_redirect_url: Optional[str] = None,
root_url: Optional[str] = None,
sign_assertions: Optional[bool] = None,
sign_documents: Optional[bool] = None,
signature_algorithm: Optional[str] = None,
signature_key_name: Optional[str] = None,
idp_initiated_sso_url_name: Optional[str] = None,
signing_private_key: Optional[str] = None,
assertion_consumer_post_url: Optional[str] = None)
func NewClient(ctx *Context, name string, args ClientArgs, opts ...ResourceOption) (*Client, error)
public Client(string name, ClientArgs args, CustomResourceOptions? opts = null)
public Client(String name, ClientArgs args)
public Client(String name, ClientArgs args, CustomResourceOptions options)
type: keycloak:saml:Client
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ClientArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ClientArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ClientArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ClientArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ClientArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var keycloakClientResource = new Keycloak.Saml.Client("keycloakClientResource", new()
{
ClientId = "string",
RealmId = "string",
IdpInitiatedSsoRelayState = "string",
SigningCertificate = "string",
CanonicalizationMethod = "string",
AuthenticationFlowBindingOverrides = new Keycloak.Saml.Inputs.ClientAuthenticationFlowBindingOverridesArgs
{
BrowserId = "string",
DirectGrantId = "string",
},
ClientSignatureRequired = false,
Description = "string",
IncludeAuthnStatement = false,
EncryptAssertions = false,
EncryptionCertificate = "string",
ExtraConfig =
{
{ "string", "string" },
},
ForceNameIdFormat = false,
ForcePostBinding = false,
FrontChannelLogout = false,
FullScopeAllowed = false,
ValidRedirectUris = new[]
{
"string",
},
BaseUrl = "string",
Enabled = false,
LoginTheme = "string",
LogoutServicePostBindingUrl = "string",
LogoutServiceRedirectBindingUrl = "string",
MasterSamlProcessingUrl = "string",
Name = "string",
NameIdFormat = "string",
AssertionConsumerRedirectUrl = "string",
RootUrl = "string",
SignAssertions = false,
SignDocuments = false,
SignatureAlgorithm = "string",
SignatureKeyName = "string",
IdpInitiatedSsoUrlName = "string",
SigningPrivateKey = "string",
AssertionConsumerPostUrl = "string",
});
example, err := saml.NewClient(ctx, "keycloakClientResource", &saml.ClientArgs{
ClientId: pulumi.String("string"),
RealmId: pulumi.String("string"),
IdpInitiatedSsoRelayState: pulumi.String("string"),
SigningCertificate: pulumi.String("string"),
CanonicalizationMethod: pulumi.String("string"),
AuthenticationFlowBindingOverrides: &saml.ClientAuthenticationFlowBindingOverridesArgs{
BrowserId: pulumi.String("string"),
DirectGrantId: pulumi.String("string"),
},
ClientSignatureRequired: pulumi.Bool(false),
Description: pulumi.String("string"),
IncludeAuthnStatement: pulumi.Bool(false),
EncryptAssertions: pulumi.Bool(false),
EncryptionCertificate: pulumi.String("string"),
ExtraConfig: pulumi.StringMap{
"string": pulumi.String("string"),
},
ForceNameIdFormat: pulumi.Bool(false),
ForcePostBinding: pulumi.Bool(false),
FrontChannelLogout: pulumi.Bool(false),
FullScopeAllowed: pulumi.Bool(false),
ValidRedirectUris: pulumi.StringArray{
pulumi.String("string"),
},
BaseUrl: pulumi.String("string"),
Enabled: pulumi.Bool(false),
LoginTheme: pulumi.String("string"),
LogoutServicePostBindingUrl: pulumi.String("string"),
LogoutServiceRedirectBindingUrl: pulumi.String("string"),
MasterSamlProcessingUrl: pulumi.String("string"),
Name: pulumi.String("string"),
NameIdFormat: pulumi.String("string"),
AssertionConsumerRedirectUrl: pulumi.String("string"),
RootUrl: pulumi.String("string"),
SignAssertions: pulumi.Bool(false),
SignDocuments: pulumi.Bool(false),
SignatureAlgorithm: pulumi.String("string"),
SignatureKeyName: pulumi.String("string"),
IdpInitiatedSsoUrlName: pulumi.String("string"),
SigningPrivateKey: pulumi.String("string"),
AssertionConsumerPostUrl: pulumi.String("string"),
})
var keycloakClientResource = new Client("keycloakClientResource", ClientArgs.builder()
.clientId("string")
.realmId("string")
.idpInitiatedSsoRelayState("string")
.signingCertificate("string")
.canonicalizationMethod("string")
.authenticationFlowBindingOverrides(ClientAuthenticationFlowBindingOverridesArgs.builder()
.browserId("string")
.directGrantId("string")
.build())
.clientSignatureRequired(false)
.description("string")
.includeAuthnStatement(false)
.encryptAssertions(false)
.encryptionCertificate("string")
.extraConfig(Map.of("string", "string"))
.forceNameIdFormat(false)
.forcePostBinding(false)
.frontChannelLogout(false)
.fullScopeAllowed(false)
.validRedirectUris("string")
.baseUrl("string")
.enabled(false)
.loginTheme("string")
.logoutServicePostBindingUrl("string")
.logoutServiceRedirectBindingUrl("string")
.masterSamlProcessingUrl("string")
.name("string")
.nameIdFormat("string")
.assertionConsumerRedirectUrl("string")
.rootUrl("string")
.signAssertions(false)
.signDocuments(false)
.signatureAlgorithm("string")
.signatureKeyName("string")
.idpInitiatedSsoUrlName("string")
.signingPrivateKey("string")
.assertionConsumerPostUrl("string")
.build());
keycloak_client_resource = keycloak.saml.Client("keycloakClientResource",
client_id="string",
realm_id="string",
idp_initiated_sso_relay_state="string",
signing_certificate="string",
canonicalization_method="string",
authentication_flow_binding_overrides={
"browser_id": "string",
"direct_grant_id": "string",
},
client_signature_required=False,
description="string",
include_authn_statement=False,
encrypt_assertions=False,
encryption_certificate="string",
extra_config={
"string": "string",
},
force_name_id_format=False,
force_post_binding=False,
front_channel_logout=False,
full_scope_allowed=False,
valid_redirect_uris=["string"],
base_url="string",
enabled=False,
login_theme="string",
logout_service_post_binding_url="string",
logout_service_redirect_binding_url="string",
master_saml_processing_url="string",
name="string",
name_id_format="string",
assertion_consumer_redirect_url="string",
root_url="string",
sign_assertions=False,
sign_documents=False,
signature_algorithm="string",
signature_key_name="string",
idp_initiated_sso_url_name="string",
signing_private_key="string",
assertion_consumer_post_url="string")
const keycloakClientResource = new keycloak.saml.Client("keycloakClientResource", {
clientId: "string",
realmId: "string",
idpInitiatedSsoRelayState: "string",
signingCertificate: "string",
canonicalizationMethod: "string",
authenticationFlowBindingOverrides: {
browserId: "string",
directGrantId: "string",
},
clientSignatureRequired: false,
description: "string",
includeAuthnStatement: false,
encryptAssertions: false,
encryptionCertificate: "string",
extraConfig: {
string: "string",
},
forceNameIdFormat: false,
forcePostBinding: false,
frontChannelLogout: false,
fullScopeAllowed: false,
validRedirectUris: ["string"],
baseUrl: "string",
enabled: false,
loginTheme: "string",
logoutServicePostBindingUrl: "string",
logoutServiceRedirectBindingUrl: "string",
masterSamlProcessingUrl: "string",
name: "string",
nameIdFormat: "string",
assertionConsumerRedirectUrl: "string",
rootUrl: "string",
signAssertions: false,
signDocuments: false,
signatureAlgorithm: "string",
signatureKeyName: "string",
idpInitiatedSsoUrlName: "string",
signingPrivateKey: "string",
assertionConsumerPostUrl: "string",
});
type: keycloak:saml:Client
properties:
assertionConsumerPostUrl: string
assertionConsumerRedirectUrl: string
authenticationFlowBindingOverrides:
browserId: string
directGrantId: string
baseUrl: string
canonicalizationMethod: string
clientId: string
clientSignatureRequired: false
description: string
enabled: false
encryptAssertions: false
encryptionCertificate: string
extraConfig:
string: string
forceNameIdFormat: false
forcePostBinding: false
frontChannelLogout: false
fullScopeAllowed: false
idpInitiatedSsoRelayState: string
idpInitiatedSsoUrlName: string
includeAuthnStatement: false
loginTheme: string
logoutServicePostBindingUrl: string
logoutServiceRedirectBindingUrl: string
masterSamlProcessingUrl: string
name: string
nameIdFormat: string
realmId: string
rootUrl: string
signAssertions: false
signDocuments: false
signatureAlgorithm: string
signatureKeyName: string
signingCertificate: string
signingPrivateKey: string
validRedirectUris:
- string
Client Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Client resource accepts the following input properties:
- Client
Id string - The unique ID of this client, referenced in the URI during authentication and in issued tokens.
- Realm
Id string - The realm this client is attached to.
- Assertion
Consumer stringPost Url - SAML POST Binding URL for the client's assertion consumer service (login responses).
- Assertion
Consumer stringRedirect Url - SAML Redirect Binding URL for the client's assertion consumer service (login responses).
- Authentication
Flow ClientBinding Overrides Authentication Flow Binding Overrides - Override realm authentication flow bindings
- Base
Url string - When specified, this URL will be used whenever Keycloak needs to link to this client.
- Canonicalization
Method string - The Canonicalization Method for XML signatures. Should be one of "EXCLUSIVE", "EXCLUSIVE_WITH_COMMENTS", "INCLUSIVE", or "INCLUSIVE_WITH_COMMENTS". Defaults to "EXCLUSIVE".
- Client
Signature boolRequired - When
true
, Keycloak will expect that documents originating from a client will be signed using the certificate and/or key configured viasigning_certificate
andsigning_private_key
. Defaults totrue
. - Description string
- The description of this client in the GUI.
- Enabled bool
- When false, this client will not be able to initiate a login or obtain access tokens. Defaults to
true
. - Encrypt
Assertions bool - When
true
, the SAML assertions will be encrypted by Keycloak using the client's public key. Defaults tofalse
. - Encryption
Certificate string - If assertions for the client are encrypted, this certificate will be used for encryption.
- Extra
Config Dictionary<string, string> - Force
Name boolId Format - Ignore requested NameID subject format and use the one defined in
name_id_format
instead. Defaults tofalse
. - Force
Post boolBinding - When
true
, Keycloak will always respond to an authentication request via the SAML POST Binding. Defaults totrue
. - Front
Channel boolLogout - When
true
, this client will require a browser redirect in order to perform a logout. Defaults totrue
. - Full
Scope boolAllowed - Allow to include all roles mappings in the access token
- Idp
Initiated stringSso Relay State - Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
- Idp
Initiated stringSso Url Name - URL fragment name to reference client when you want to do IDP Initiated SSO.
- Include
Authn boolStatement - When
true
, anAuthnStatement
will be included in the SAML response. Defaults totrue
. - Login
Theme string - The login theme of this client.
- Logout
Service stringPost Binding Url - SAML POST Binding URL for the client's single logout service.
- Logout
Service stringRedirect Binding Url - SAML Redirect Binding URL for the client's single logout service.
- Master
Saml stringProcessing Url - When specified, this URL will be used for all SAML requests.
- Name string
- The display name of this client in the GUI.
- Name
Id stringFormat - Sets the Name ID format for the subject.
- Root
Url string - When specified, this value is prepended to all relative URLs.
- Sign
Assertions bool - When
true
, the SAML assertions will be signed by Keycloak using the realm's private key, and embedded within the SAML XML Auth response. Defaults tofalse
. - Sign
Documents bool - When
true
, the SAML document will be signed by Keycloak using the realm's private key. Defaults totrue
. - Signature
Algorithm string - The signature algorithm used to sign documents. Should be one of "RSA_SHA1", "RSA_SHA256", "RSA_SHA256_MGF1, "RSA_SHA512", "RSA_SHA512_MGF1" or "DSA_SHA1".
- Signature
Key stringName - The value of the
KeyName
element within the signed SAML document. Should be one of "NONE", "KEY_ID", or "CERT_SUBJECT". Defaults to "KEY_ID". - Signing
Certificate string - If documents or assertions from the client are signed, this certificate will be used to verify the signature.
- Signing
Private stringKey - If documents or assertions from the client are signed, this private key will be used to verify the signature.
- Valid
Redirect List<string>Uris - When specified, Keycloak will use this list to validate given Assertion Consumer URLs specified in the authentication request.
- Client
Id string - The unique ID of this client, referenced in the URI during authentication and in issued tokens.
- Realm
Id string - The realm this client is attached to.
- Assertion
Consumer stringPost Url - SAML POST Binding URL for the client's assertion consumer service (login responses).
- Assertion
Consumer stringRedirect Url - SAML Redirect Binding URL for the client's assertion consumer service (login responses).
- Authentication
Flow ClientBinding Overrides Authentication Flow Binding Overrides Args - Override realm authentication flow bindings
- Base
Url string - When specified, this URL will be used whenever Keycloak needs to link to this client.
- Canonicalization
Method string - The Canonicalization Method for XML signatures. Should be one of "EXCLUSIVE", "EXCLUSIVE_WITH_COMMENTS", "INCLUSIVE", or "INCLUSIVE_WITH_COMMENTS". Defaults to "EXCLUSIVE".
- Client
Signature boolRequired - When
true
, Keycloak will expect that documents originating from a client will be signed using the certificate and/or key configured viasigning_certificate
andsigning_private_key
. Defaults totrue
. - Description string
- The description of this client in the GUI.
- Enabled bool
- When false, this client will not be able to initiate a login or obtain access tokens. Defaults to
true
. - Encrypt
Assertions bool - When
true
, the SAML assertions will be encrypted by Keycloak using the client's public key. Defaults tofalse
. - Encryption
Certificate string - If assertions for the client are encrypted, this certificate will be used for encryption.
- Extra
Config map[string]string - Force
Name boolId Format - Ignore requested NameID subject format and use the one defined in
name_id_format
instead. Defaults tofalse
. - Force
Post boolBinding - When
true
, Keycloak will always respond to an authentication request via the SAML POST Binding. Defaults totrue
. - Front
Channel boolLogout - When
true
, this client will require a browser redirect in order to perform a logout. Defaults totrue
. - Full
Scope boolAllowed - Allow to include all roles mappings in the access token
- Idp
Initiated stringSso Relay State - Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
- Idp
Initiated stringSso Url Name - URL fragment name to reference client when you want to do IDP Initiated SSO.
- Include
Authn boolStatement - When
true
, anAuthnStatement
will be included in the SAML response. Defaults totrue
. - Login
Theme string - The login theme of this client.
- Logout
Service stringPost Binding Url - SAML POST Binding URL for the client's single logout service.
- Logout
Service stringRedirect Binding Url - SAML Redirect Binding URL for the client's single logout service.
- Master
Saml stringProcessing Url - When specified, this URL will be used for all SAML requests.
- Name string
- The display name of this client in the GUI.
- Name
Id stringFormat - Sets the Name ID format for the subject.
- Root
Url string - When specified, this value is prepended to all relative URLs.
- Sign
Assertions bool - When
true
, the SAML assertions will be signed by Keycloak using the realm's private key, and embedded within the SAML XML Auth response. Defaults tofalse
. - Sign
Documents bool - When
true
, the SAML document will be signed by Keycloak using the realm's private key. Defaults totrue
. - Signature
Algorithm string - The signature algorithm used to sign documents. Should be one of "RSA_SHA1", "RSA_SHA256", "RSA_SHA256_MGF1, "RSA_SHA512", "RSA_SHA512_MGF1" or "DSA_SHA1".
- Signature
Key stringName - The value of the
KeyName
element within the signed SAML document. Should be one of "NONE", "KEY_ID", or "CERT_SUBJECT". Defaults to "KEY_ID". - Signing
Certificate string - If documents or assertions from the client are signed, this certificate will be used to verify the signature.
- Signing
Private stringKey - If documents or assertions from the client are signed, this private key will be used to verify the signature.
- Valid
Redirect []stringUris - When specified, Keycloak will use this list to validate given Assertion Consumer URLs specified in the authentication request.
- client
Id String - The unique ID of this client, referenced in the URI during authentication and in issued tokens.
- realm
Id String - The realm this client is attached to.
- assertion
Consumer StringPost Url - SAML POST Binding URL for the client's assertion consumer service (login responses).
- assertion
Consumer StringRedirect Url - SAML Redirect Binding URL for the client's assertion consumer service (login responses).
- authentication
Flow ClientBinding Overrides Authentication Flow Binding Overrides - Override realm authentication flow bindings
- base
Url String - When specified, this URL will be used whenever Keycloak needs to link to this client.
- canonicalization
Method String - The Canonicalization Method for XML signatures. Should be one of "EXCLUSIVE", "EXCLUSIVE_WITH_COMMENTS", "INCLUSIVE", or "INCLUSIVE_WITH_COMMENTS". Defaults to "EXCLUSIVE".
- client
Signature BooleanRequired - When
true
, Keycloak will expect that documents originating from a client will be signed using the certificate and/or key configured viasigning_certificate
andsigning_private_key
. Defaults totrue
. - description String
- The description of this client in the GUI.
- enabled Boolean
- When false, this client will not be able to initiate a login or obtain access tokens. Defaults to
true
. - encrypt
Assertions Boolean - When
true
, the SAML assertions will be encrypted by Keycloak using the client's public key. Defaults tofalse
. - encryption
Certificate String - If assertions for the client are encrypted, this certificate will be used for encryption.
- extra
Config Map<String,String> - force
Name BooleanId Format - Ignore requested NameID subject format and use the one defined in
name_id_format
instead. Defaults tofalse
. - force
Post BooleanBinding - When
true
, Keycloak will always respond to an authentication request via the SAML POST Binding. Defaults totrue
. - front
Channel BooleanLogout - When
true
, this client will require a browser redirect in order to perform a logout. Defaults totrue
. - full
Scope BooleanAllowed - Allow to include all roles mappings in the access token
- idp
Initiated StringSso Relay State - Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
- idp
Initiated StringSso Url Name - URL fragment name to reference client when you want to do IDP Initiated SSO.
- include
Authn BooleanStatement - When
true
, anAuthnStatement
will be included in the SAML response. Defaults totrue
. - login
Theme String - The login theme of this client.
- logout
Service StringPost Binding Url - SAML POST Binding URL for the client's single logout service.
- logout
Service StringRedirect Binding Url - SAML Redirect Binding URL for the client's single logout service.
- master
Saml StringProcessing Url - When specified, this URL will be used for all SAML requests.
- name String
- The display name of this client in the GUI.
- name
Id StringFormat - Sets the Name ID format for the subject.
- root
Url String - When specified, this value is prepended to all relative URLs.
- sign
Assertions Boolean - When
true
, the SAML assertions will be signed by Keycloak using the realm's private key, and embedded within the SAML XML Auth response. Defaults tofalse
. - sign
Documents Boolean - When
true
, the SAML document will be signed by Keycloak using the realm's private key. Defaults totrue
. - signature
Algorithm String - The signature algorithm used to sign documents. Should be one of "RSA_SHA1", "RSA_SHA256", "RSA_SHA256_MGF1, "RSA_SHA512", "RSA_SHA512_MGF1" or "DSA_SHA1".
- signature
Key StringName - The value of the
KeyName
element within the signed SAML document. Should be one of "NONE", "KEY_ID", or "CERT_SUBJECT". Defaults to "KEY_ID". - signing
Certificate String - If documents or assertions from the client are signed, this certificate will be used to verify the signature.
- signing
Private StringKey - If documents or assertions from the client are signed, this private key will be used to verify the signature.
- valid
Redirect List<String>Uris - When specified, Keycloak will use this list to validate given Assertion Consumer URLs specified in the authentication request.
- client
Id string - The unique ID of this client, referenced in the URI during authentication and in issued tokens.
- realm
Id string - The realm this client is attached to.
- assertion
Consumer stringPost Url - SAML POST Binding URL for the client's assertion consumer service (login responses).
- assertion
Consumer stringRedirect Url - SAML Redirect Binding URL for the client's assertion consumer service (login responses).
- authentication
Flow ClientBinding Overrides Authentication Flow Binding Overrides - Override realm authentication flow bindings
- base
Url string - When specified, this URL will be used whenever Keycloak needs to link to this client.
- canonicalization
Method string - The Canonicalization Method for XML signatures. Should be one of "EXCLUSIVE", "EXCLUSIVE_WITH_COMMENTS", "INCLUSIVE", or "INCLUSIVE_WITH_COMMENTS". Defaults to "EXCLUSIVE".
- client
Signature booleanRequired - When
true
, Keycloak will expect that documents originating from a client will be signed using the certificate and/or key configured viasigning_certificate
andsigning_private_key
. Defaults totrue
. - description string
- The description of this client in the GUI.
- enabled boolean
- When false, this client will not be able to initiate a login or obtain access tokens. Defaults to
true
. - encrypt
Assertions boolean - When
true
, the SAML assertions will be encrypted by Keycloak using the client's public key. Defaults tofalse
. - encryption
Certificate string - If assertions for the client are encrypted, this certificate will be used for encryption.
- extra
Config {[key: string]: string} - force
Name booleanId Format - Ignore requested NameID subject format and use the one defined in
name_id_format
instead. Defaults tofalse
. - force
Post booleanBinding - When
true
, Keycloak will always respond to an authentication request via the SAML POST Binding. Defaults totrue
. - front
Channel booleanLogout - When
true
, this client will require a browser redirect in order to perform a logout. Defaults totrue
. - full
Scope booleanAllowed - Allow to include all roles mappings in the access token
- idp
Initiated stringSso Relay State - Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
- idp
Initiated stringSso Url Name - URL fragment name to reference client when you want to do IDP Initiated SSO.
- include
Authn booleanStatement - When
true
, anAuthnStatement
will be included in the SAML response. Defaults totrue
. - login
Theme string - The login theme of this client.
- logout
Service stringPost Binding Url - SAML POST Binding URL for the client's single logout service.
- logout
Service stringRedirect Binding Url - SAML Redirect Binding URL for the client's single logout service.
- master
Saml stringProcessing Url - When specified, this URL will be used for all SAML requests.
- name string
- The display name of this client in the GUI.
- name
Id stringFormat - Sets the Name ID format for the subject.
- root
Url string - When specified, this value is prepended to all relative URLs.
- sign
Assertions boolean - When
true
, the SAML assertions will be signed by Keycloak using the realm's private key, and embedded within the SAML XML Auth response. Defaults tofalse
. - sign
Documents boolean - When
true
, the SAML document will be signed by Keycloak using the realm's private key. Defaults totrue
. - signature
Algorithm string - The signature algorithm used to sign documents. Should be one of "RSA_SHA1", "RSA_SHA256", "RSA_SHA256_MGF1, "RSA_SHA512", "RSA_SHA512_MGF1" or "DSA_SHA1".
- signature
Key stringName - The value of the
KeyName
element within the signed SAML document. Should be one of "NONE", "KEY_ID", or "CERT_SUBJECT". Defaults to "KEY_ID". - signing
Certificate string - If documents or assertions from the client are signed, this certificate will be used to verify the signature.
- signing
Private stringKey - If documents or assertions from the client are signed, this private key will be used to verify the signature.
- valid
Redirect string[]Uris - When specified, Keycloak will use this list to validate given Assertion Consumer URLs specified in the authentication request.
- client_
id str - The unique ID of this client, referenced in the URI during authentication and in issued tokens.
- realm_
id str - The realm this client is attached to.
- assertion_
consumer_ strpost_ url - SAML POST Binding URL for the client's assertion consumer service (login responses).
- assertion_
consumer_ strredirect_ url - SAML Redirect Binding URL for the client's assertion consumer service (login responses).
- authentication_
flow_ Clientbinding_ overrides Authentication Flow Binding Overrides Args - Override realm authentication flow bindings
- base_
url str - When specified, this URL will be used whenever Keycloak needs to link to this client.
- canonicalization_
method str - The Canonicalization Method for XML signatures. Should be one of "EXCLUSIVE", "EXCLUSIVE_WITH_COMMENTS", "INCLUSIVE", or "INCLUSIVE_WITH_COMMENTS". Defaults to "EXCLUSIVE".
- client_
signature_ boolrequired - When
true
, Keycloak will expect that documents originating from a client will be signed using the certificate and/or key configured viasigning_certificate
andsigning_private_key
. Defaults totrue
. - description str
- The description of this client in the GUI.
- enabled bool
- When false, this client will not be able to initiate a login or obtain access tokens. Defaults to
true
. - encrypt_
assertions bool - When
true
, the SAML assertions will be encrypted by Keycloak using the client's public key. Defaults tofalse
. - encryption_
certificate str - If assertions for the client are encrypted, this certificate will be used for encryption.
- extra_
config Mapping[str, str] - force_
name_ boolid_ format - Ignore requested NameID subject format and use the one defined in
name_id_format
instead. Defaults tofalse
. - force_
post_ boolbinding - When
true
, Keycloak will always respond to an authentication request via the SAML POST Binding. Defaults totrue
. - front_
channel_ boollogout - When
true
, this client will require a browser redirect in order to perform a logout. Defaults totrue
. - full_
scope_ boolallowed - Allow to include all roles mappings in the access token
- idp_
initiated_ strsso_ relay_ state - Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
- idp_
initiated_ strsso_ url_ name - URL fragment name to reference client when you want to do IDP Initiated SSO.
- include_
authn_ boolstatement - When
true
, anAuthnStatement
will be included in the SAML response. Defaults totrue
. - login_
theme str - The login theme of this client.
- logout_
service_ strpost_ binding_ url - SAML POST Binding URL for the client's single logout service.
- logout_
service_ strredirect_ binding_ url - SAML Redirect Binding URL for the client's single logout service.
- master_
saml_ strprocessing_ url - When specified, this URL will be used for all SAML requests.
- name str
- The display name of this client in the GUI.
- name_
id_ strformat - Sets the Name ID format for the subject.
- root_
url str - When specified, this value is prepended to all relative URLs.
- sign_
assertions bool - When
true
, the SAML assertions will be signed by Keycloak using the realm's private key, and embedded within the SAML XML Auth response. Defaults tofalse
. - sign_
documents bool - When
true
, the SAML document will be signed by Keycloak using the realm's private key. Defaults totrue
. - signature_
algorithm str - The signature algorithm used to sign documents. Should be one of "RSA_SHA1", "RSA_SHA256", "RSA_SHA256_MGF1, "RSA_SHA512", "RSA_SHA512_MGF1" or "DSA_SHA1".
- signature_
key_ strname - The value of the
KeyName
element within the signed SAML document. Should be one of "NONE", "KEY_ID", or "CERT_SUBJECT". Defaults to "KEY_ID". - signing_
certificate str - If documents or assertions from the client are signed, this certificate will be used to verify the signature.
- signing_
private_ strkey - If documents or assertions from the client are signed, this private key will be used to verify the signature.
- valid_
redirect_ Sequence[str]uris - When specified, Keycloak will use this list to validate given Assertion Consumer URLs specified in the authentication request.
- client
Id String - The unique ID of this client, referenced in the URI during authentication and in issued tokens.
- realm
Id String - The realm this client is attached to.
- assertion
Consumer StringPost Url - SAML POST Binding URL for the client's assertion consumer service (login responses).
- assertion
Consumer StringRedirect Url - SAML Redirect Binding URL for the client's assertion consumer service (login responses).
- authentication
Flow Property MapBinding Overrides - Override realm authentication flow bindings
- base
Url String - When specified, this URL will be used whenever Keycloak needs to link to this client.
- canonicalization
Method String - The Canonicalization Method for XML signatures. Should be one of "EXCLUSIVE", "EXCLUSIVE_WITH_COMMENTS", "INCLUSIVE", or "INCLUSIVE_WITH_COMMENTS". Defaults to "EXCLUSIVE".
- client
Signature BooleanRequired - When
true
, Keycloak will expect that documents originating from a client will be signed using the certificate and/or key configured viasigning_certificate
andsigning_private_key
. Defaults totrue
. - description String
- The description of this client in the GUI.
- enabled Boolean
- When false, this client will not be able to initiate a login or obtain access tokens. Defaults to
true
. - encrypt
Assertions Boolean - When
true
, the SAML assertions will be encrypted by Keycloak using the client's public key. Defaults tofalse
. - encryption
Certificate String - If assertions for the client are encrypted, this certificate will be used for encryption.
- extra
Config Map<String> - force
Name BooleanId Format - Ignore requested NameID subject format and use the one defined in
name_id_format
instead. Defaults tofalse
. - force
Post BooleanBinding - When
true
, Keycloak will always respond to an authentication request via the SAML POST Binding. Defaults totrue
. - front
Channel BooleanLogout - When
true
, this client will require a browser redirect in order to perform a logout. Defaults totrue
. - full
Scope BooleanAllowed - Allow to include all roles mappings in the access token
- idp
Initiated StringSso Relay State - Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
- idp
Initiated StringSso Url Name - URL fragment name to reference client when you want to do IDP Initiated SSO.
- include
Authn BooleanStatement - When
true
, anAuthnStatement
will be included in the SAML response. Defaults totrue
. - login
Theme String - The login theme of this client.
- logout
Service StringPost Binding Url - SAML POST Binding URL for the client's single logout service.
- logout
Service StringRedirect Binding Url - SAML Redirect Binding URL for the client's single logout service.
- master
Saml StringProcessing Url - When specified, this URL will be used for all SAML requests.
- name String
- The display name of this client in the GUI.
- name
Id StringFormat - Sets the Name ID format for the subject.
- root
Url String - When specified, this value is prepended to all relative URLs.
- sign
Assertions Boolean - When
true
, the SAML assertions will be signed by Keycloak using the realm's private key, and embedded within the SAML XML Auth response. Defaults tofalse
. - sign
Documents Boolean - When
true
, the SAML document will be signed by Keycloak using the realm's private key. Defaults totrue
. - signature
Algorithm String - The signature algorithm used to sign documents. Should be one of "RSA_SHA1", "RSA_SHA256", "RSA_SHA256_MGF1, "RSA_SHA512", "RSA_SHA512_MGF1" or "DSA_SHA1".
- signature
Key StringName - The value of the
KeyName
element within the signed SAML document. Should be one of "NONE", "KEY_ID", or "CERT_SUBJECT". Defaults to "KEY_ID". - signing
Certificate String - If documents or assertions from the client are signed, this certificate will be used to verify the signature.
- signing
Private StringKey - If documents or assertions from the client are signed, this private key will be used to verify the signature.
- valid
Redirect List<String>Uris - When specified, Keycloak will use this list to validate given Assertion Consumer URLs specified in the authentication request.
Outputs
All input properties are implicitly available as output properties. Additionally, the Client resource produces the following output properties:
- Encryption
Certificate stringSha1 - (Computed) The sha1sum fingerprint of the encryption certificate. If the encryption certificate is not in correct base64 format, this will be left empty.
- Id string
- The provider-assigned unique ID for this managed resource.
- Signing
Certificate stringSha1 - (Computed) The sha1sum fingerprint of the signing certificate. If the signing certificate is not in correct base64 format, this will be left empty.
- Signing
Private stringKey Sha1 - (Computed) The sha1sum fingerprint of the signing private key. If the signing private key is not in correct base64 format, this will be left empty.
- Encryption
Certificate stringSha1 - (Computed) The sha1sum fingerprint of the encryption certificate. If the encryption certificate is not in correct base64 format, this will be left empty.
- Id string
- The provider-assigned unique ID for this managed resource.
- Signing
Certificate stringSha1 - (Computed) The sha1sum fingerprint of the signing certificate. If the signing certificate is not in correct base64 format, this will be left empty.
- Signing
Private stringKey Sha1 - (Computed) The sha1sum fingerprint of the signing private key. If the signing private key is not in correct base64 format, this will be left empty.
- encryption
Certificate StringSha1 - (Computed) The sha1sum fingerprint of the encryption certificate. If the encryption certificate is not in correct base64 format, this will be left empty.
- id String
- The provider-assigned unique ID for this managed resource.
- signing
Certificate StringSha1 - (Computed) The sha1sum fingerprint of the signing certificate. If the signing certificate is not in correct base64 format, this will be left empty.
- signing
Private StringKey Sha1 - (Computed) The sha1sum fingerprint of the signing private key. If the signing private key is not in correct base64 format, this will be left empty.
- encryption
Certificate stringSha1 - (Computed) The sha1sum fingerprint of the encryption certificate. If the encryption certificate is not in correct base64 format, this will be left empty.
- id string
- The provider-assigned unique ID for this managed resource.
- signing
Certificate stringSha1 - (Computed) The sha1sum fingerprint of the signing certificate. If the signing certificate is not in correct base64 format, this will be left empty.
- signing
Private stringKey Sha1 - (Computed) The sha1sum fingerprint of the signing private key. If the signing private key is not in correct base64 format, this will be left empty.
- encryption_
certificate_ strsha1 - (Computed) The sha1sum fingerprint of the encryption certificate. If the encryption certificate is not in correct base64 format, this will be left empty.
- id str
- The provider-assigned unique ID for this managed resource.
- signing_
certificate_ strsha1 - (Computed) The sha1sum fingerprint of the signing certificate. If the signing certificate is not in correct base64 format, this will be left empty.
- signing_
private_ strkey_ sha1 - (Computed) The sha1sum fingerprint of the signing private key. If the signing private key is not in correct base64 format, this will be left empty.
- encryption
Certificate StringSha1 - (Computed) The sha1sum fingerprint of the encryption certificate. If the encryption certificate is not in correct base64 format, this will be left empty.
- id String
- The provider-assigned unique ID for this managed resource.
- signing
Certificate StringSha1 - (Computed) The sha1sum fingerprint of the signing certificate. If the signing certificate is not in correct base64 format, this will be left empty.
- signing
Private StringKey Sha1 - (Computed) The sha1sum fingerprint of the signing private key. If the signing private key is not in correct base64 format, this will be left empty.
Look up Existing Client Resource
Get an existing Client resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ClientState, opts?: CustomResourceOptions): Client
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
assertion_consumer_post_url: Optional[str] = None,
assertion_consumer_redirect_url: Optional[str] = None,
authentication_flow_binding_overrides: Optional[ClientAuthenticationFlowBindingOverridesArgs] = None,
base_url: Optional[str] = None,
canonicalization_method: Optional[str] = None,
client_id: Optional[str] = None,
client_signature_required: Optional[bool] = None,
description: Optional[str] = None,
enabled: Optional[bool] = None,
encrypt_assertions: Optional[bool] = None,
encryption_certificate: Optional[str] = None,
encryption_certificate_sha1: Optional[str] = None,
extra_config: Optional[Mapping[str, str]] = None,
force_name_id_format: Optional[bool] = None,
force_post_binding: Optional[bool] = None,
front_channel_logout: Optional[bool] = None,
full_scope_allowed: Optional[bool] = None,
idp_initiated_sso_relay_state: Optional[str] = None,
idp_initiated_sso_url_name: Optional[str] = None,
include_authn_statement: Optional[bool] = None,
login_theme: Optional[str] = None,
logout_service_post_binding_url: Optional[str] = None,
logout_service_redirect_binding_url: Optional[str] = None,
master_saml_processing_url: Optional[str] = None,
name: Optional[str] = None,
name_id_format: Optional[str] = None,
realm_id: Optional[str] = None,
root_url: Optional[str] = None,
sign_assertions: Optional[bool] = None,
sign_documents: Optional[bool] = None,
signature_algorithm: Optional[str] = None,
signature_key_name: Optional[str] = None,
signing_certificate: Optional[str] = None,
signing_certificate_sha1: Optional[str] = None,
signing_private_key: Optional[str] = None,
signing_private_key_sha1: Optional[str] = None,
valid_redirect_uris: Optional[Sequence[str]] = None) -> Client
func GetClient(ctx *Context, name string, id IDInput, state *ClientState, opts ...ResourceOption) (*Client, error)
public static Client Get(string name, Input<string> id, ClientState? state, CustomResourceOptions? opts = null)
public static Client get(String name, Output<String> id, ClientState state, CustomResourceOptions options)
resources: _: type: keycloak:saml:Client get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Assertion
Consumer stringPost Url - SAML POST Binding URL for the client's assertion consumer service (login responses).
- Assertion
Consumer stringRedirect Url - SAML Redirect Binding URL for the client's assertion consumer service (login responses).
- Authentication
Flow ClientBinding Overrides Authentication Flow Binding Overrides - Override realm authentication flow bindings
- Base
Url string - When specified, this URL will be used whenever Keycloak needs to link to this client.
- Canonicalization
Method string - The Canonicalization Method for XML signatures. Should be one of "EXCLUSIVE", "EXCLUSIVE_WITH_COMMENTS", "INCLUSIVE", or "INCLUSIVE_WITH_COMMENTS". Defaults to "EXCLUSIVE".
- Client
Id string - The unique ID of this client, referenced in the URI during authentication and in issued tokens.
- Client
Signature boolRequired - When
true
, Keycloak will expect that documents originating from a client will be signed using the certificate and/or key configured viasigning_certificate
andsigning_private_key
. Defaults totrue
. - Description string
- The description of this client in the GUI.
- Enabled bool
- When false, this client will not be able to initiate a login or obtain access tokens. Defaults to
true
. - Encrypt
Assertions bool - When
true
, the SAML assertions will be encrypted by Keycloak using the client's public key. Defaults tofalse
. - Encryption
Certificate string - If assertions for the client are encrypted, this certificate will be used for encryption.
- Encryption
Certificate stringSha1 - (Computed) The sha1sum fingerprint of the encryption certificate. If the encryption certificate is not in correct base64 format, this will be left empty.
- Extra
Config Dictionary<string, string> - Force
Name boolId Format - Ignore requested NameID subject format and use the one defined in
name_id_format
instead. Defaults tofalse
. - Force
Post boolBinding - When
true
, Keycloak will always respond to an authentication request via the SAML POST Binding. Defaults totrue
. - Front
Channel boolLogout - When
true
, this client will require a browser redirect in order to perform a logout. Defaults totrue
. - Full
Scope boolAllowed - Allow to include all roles mappings in the access token
- Idp
Initiated stringSso Relay State - Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
- Idp
Initiated stringSso Url Name - URL fragment name to reference client when you want to do IDP Initiated SSO.
- Include
Authn boolStatement - When
true
, anAuthnStatement
will be included in the SAML response. Defaults totrue
. - Login
Theme string - The login theme of this client.
- Logout
Service stringPost Binding Url - SAML POST Binding URL for the client's single logout service.
- Logout
Service stringRedirect Binding Url - SAML Redirect Binding URL for the client's single logout service.
- Master
Saml stringProcessing Url - When specified, this URL will be used for all SAML requests.
- Name string
- The display name of this client in the GUI.
- Name
Id stringFormat - Sets the Name ID format for the subject.
- Realm
Id string - The realm this client is attached to.
- Root
Url string - When specified, this value is prepended to all relative URLs.
- Sign
Assertions bool - When
true
, the SAML assertions will be signed by Keycloak using the realm's private key, and embedded within the SAML XML Auth response. Defaults tofalse
. - Sign
Documents bool - When
true
, the SAML document will be signed by Keycloak using the realm's private key. Defaults totrue
. - Signature
Algorithm string - The signature algorithm used to sign documents. Should be one of "RSA_SHA1", "RSA_SHA256", "RSA_SHA256_MGF1, "RSA_SHA512", "RSA_SHA512_MGF1" or "DSA_SHA1".
- Signature
Key stringName - The value of the
KeyName
element within the signed SAML document. Should be one of "NONE", "KEY_ID", or "CERT_SUBJECT". Defaults to "KEY_ID". - Signing
Certificate string - If documents or assertions from the client are signed, this certificate will be used to verify the signature.
- Signing
Certificate stringSha1 - (Computed) The sha1sum fingerprint of the signing certificate. If the signing certificate is not in correct base64 format, this will be left empty.
- Signing
Private stringKey - If documents or assertions from the client are signed, this private key will be used to verify the signature.
- Signing
Private stringKey Sha1 - (Computed) The sha1sum fingerprint of the signing private key. If the signing private key is not in correct base64 format, this will be left empty.
- Valid
Redirect List<string>Uris - When specified, Keycloak will use this list to validate given Assertion Consumer URLs specified in the authentication request.
- Assertion
Consumer stringPost Url - SAML POST Binding URL for the client's assertion consumer service (login responses).
- Assertion
Consumer stringRedirect Url - SAML Redirect Binding URL for the client's assertion consumer service (login responses).
- Authentication
Flow ClientBinding Overrides Authentication Flow Binding Overrides Args - Override realm authentication flow bindings
- Base
Url string - When specified, this URL will be used whenever Keycloak needs to link to this client.
- Canonicalization
Method string - The Canonicalization Method for XML signatures. Should be one of "EXCLUSIVE", "EXCLUSIVE_WITH_COMMENTS", "INCLUSIVE", or "INCLUSIVE_WITH_COMMENTS". Defaults to "EXCLUSIVE".
- Client
Id string - The unique ID of this client, referenced in the URI during authentication and in issued tokens.
- Client
Signature boolRequired - When
true
, Keycloak will expect that documents originating from a client will be signed using the certificate and/or key configured viasigning_certificate
andsigning_private_key
. Defaults totrue
. - Description string
- The description of this client in the GUI.
- Enabled bool
- When false, this client will not be able to initiate a login or obtain access tokens. Defaults to
true
. - Encrypt
Assertions bool - When
true
, the SAML assertions will be encrypted by Keycloak using the client's public key. Defaults tofalse
. - Encryption
Certificate string - If assertions for the client are encrypted, this certificate will be used for encryption.
- Encryption
Certificate stringSha1 - (Computed) The sha1sum fingerprint of the encryption certificate. If the encryption certificate is not in correct base64 format, this will be left empty.
- Extra
Config map[string]string - Force
Name boolId Format - Ignore requested NameID subject format and use the one defined in
name_id_format
instead. Defaults tofalse
. - Force
Post boolBinding - When
true
, Keycloak will always respond to an authentication request via the SAML POST Binding. Defaults totrue
. - Front
Channel boolLogout - When
true
, this client will require a browser redirect in order to perform a logout. Defaults totrue
. - Full
Scope boolAllowed - Allow to include all roles mappings in the access token
- Idp
Initiated stringSso Relay State - Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
- Idp
Initiated stringSso Url Name - URL fragment name to reference client when you want to do IDP Initiated SSO.
- Include
Authn boolStatement - When
true
, anAuthnStatement
will be included in the SAML response. Defaults totrue
. - Login
Theme string - The login theme of this client.
- Logout
Service stringPost Binding Url - SAML POST Binding URL for the client's single logout service.
- Logout
Service stringRedirect Binding Url - SAML Redirect Binding URL for the client's single logout service.
- Master
Saml stringProcessing Url - When specified, this URL will be used for all SAML requests.
- Name string
- The display name of this client in the GUI.
- Name
Id stringFormat - Sets the Name ID format for the subject.
- Realm
Id string - The realm this client is attached to.
- Root
Url string - When specified, this value is prepended to all relative URLs.
- Sign
Assertions bool - When
true
, the SAML assertions will be signed by Keycloak using the realm's private key, and embedded within the SAML XML Auth response. Defaults tofalse
. - Sign
Documents bool - When
true
, the SAML document will be signed by Keycloak using the realm's private key. Defaults totrue
. - Signature
Algorithm string - The signature algorithm used to sign documents. Should be one of "RSA_SHA1", "RSA_SHA256", "RSA_SHA256_MGF1, "RSA_SHA512", "RSA_SHA512_MGF1" or "DSA_SHA1".
- Signature
Key stringName - The value of the
KeyName
element within the signed SAML document. Should be one of "NONE", "KEY_ID", or "CERT_SUBJECT". Defaults to "KEY_ID". - Signing
Certificate string - If documents or assertions from the client are signed, this certificate will be used to verify the signature.
- Signing
Certificate stringSha1 - (Computed) The sha1sum fingerprint of the signing certificate. If the signing certificate is not in correct base64 format, this will be left empty.
- Signing
Private stringKey - If documents or assertions from the client are signed, this private key will be used to verify the signature.
- Signing
Private stringKey Sha1 - (Computed) The sha1sum fingerprint of the signing private key. If the signing private key is not in correct base64 format, this will be left empty.
- Valid
Redirect []stringUris - When specified, Keycloak will use this list to validate given Assertion Consumer URLs specified in the authentication request.
- assertion
Consumer StringPost Url - SAML POST Binding URL for the client's assertion consumer service (login responses).
- assertion
Consumer StringRedirect Url - SAML Redirect Binding URL for the client's assertion consumer service (login responses).
- authentication
Flow ClientBinding Overrides Authentication Flow Binding Overrides - Override realm authentication flow bindings
- base
Url String - When specified, this URL will be used whenever Keycloak needs to link to this client.
- canonicalization
Method String - The Canonicalization Method for XML signatures. Should be one of "EXCLUSIVE", "EXCLUSIVE_WITH_COMMENTS", "INCLUSIVE", or "INCLUSIVE_WITH_COMMENTS". Defaults to "EXCLUSIVE".
- client
Id String - The unique ID of this client, referenced in the URI during authentication and in issued tokens.
- client
Signature BooleanRequired - When
true
, Keycloak will expect that documents originating from a client will be signed using the certificate and/or key configured viasigning_certificate
andsigning_private_key
. Defaults totrue
. - description String
- The description of this client in the GUI.
- enabled Boolean
- When false, this client will not be able to initiate a login or obtain access tokens. Defaults to
true
. - encrypt
Assertions Boolean - When
true
, the SAML assertions will be encrypted by Keycloak using the client's public key. Defaults tofalse
. - encryption
Certificate String - If assertions for the client are encrypted, this certificate will be used for encryption.
- encryption
Certificate StringSha1 - (Computed) The sha1sum fingerprint of the encryption certificate. If the encryption certificate is not in correct base64 format, this will be left empty.
- extra
Config Map<String,String> - force
Name BooleanId Format - Ignore requested NameID subject format and use the one defined in
name_id_format
instead. Defaults tofalse
. - force
Post BooleanBinding - When
true
, Keycloak will always respond to an authentication request via the SAML POST Binding. Defaults totrue
. - front
Channel BooleanLogout - When
true
, this client will require a browser redirect in order to perform a logout. Defaults totrue
. - full
Scope BooleanAllowed - Allow to include all roles mappings in the access token
- idp
Initiated StringSso Relay State - Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
- idp
Initiated StringSso Url Name - URL fragment name to reference client when you want to do IDP Initiated SSO.
- include
Authn BooleanStatement - When
true
, anAuthnStatement
will be included in the SAML response. Defaults totrue
. - login
Theme String - The login theme of this client.
- logout
Service StringPost Binding Url - SAML POST Binding URL for the client's single logout service.
- logout
Service StringRedirect Binding Url - SAML Redirect Binding URL for the client's single logout service.
- master
Saml StringProcessing Url - When specified, this URL will be used for all SAML requests.
- name String
- The display name of this client in the GUI.
- name
Id StringFormat - Sets the Name ID format for the subject.
- realm
Id String - The realm this client is attached to.
- root
Url String - When specified, this value is prepended to all relative URLs.
- sign
Assertions Boolean - When
true
, the SAML assertions will be signed by Keycloak using the realm's private key, and embedded within the SAML XML Auth response. Defaults tofalse
. - sign
Documents Boolean - When
true
, the SAML document will be signed by Keycloak using the realm's private key. Defaults totrue
. - signature
Algorithm String - The signature algorithm used to sign documents. Should be one of "RSA_SHA1", "RSA_SHA256", "RSA_SHA256_MGF1, "RSA_SHA512", "RSA_SHA512_MGF1" or "DSA_SHA1".
- signature
Key StringName - The value of the
KeyName
element within the signed SAML document. Should be one of "NONE", "KEY_ID", or "CERT_SUBJECT". Defaults to "KEY_ID". - signing
Certificate String - If documents or assertions from the client are signed, this certificate will be used to verify the signature.
- signing
Certificate StringSha1 - (Computed) The sha1sum fingerprint of the signing certificate. If the signing certificate is not in correct base64 format, this will be left empty.
- signing
Private StringKey - If documents or assertions from the client are signed, this private key will be used to verify the signature.
- signing
Private StringKey Sha1 - (Computed) The sha1sum fingerprint of the signing private key. If the signing private key is not in correct base64 format, this will be left empty.
- valid
Redirect List<String>Uris - When specified, Keycloak will use this list to validate given Assertion Consumer URLs specified in the authentication request.
- assertion
Consumer stringPost Url - SAML POST Binding URL for the client's assertion consumer service (login responses).
- assertion
Consumer stringRedirect Url - SAML Redirect Binding URL for the client's assertion consumer service (login responses).
- authentication
Flow ClientBinding Overrides Authentication Flow Binding Overrides - Override realm authentication flow bindings
- base
Url string - When specified, this URL will be used whenever Keycloak needs to link to this client.
- canonicalization
Method string - The Canonicalization Method for XML signatures. Should be one of "EXCLUSIVE", "EXCLUSIVE_WITH_COMMENTS", "INCLUSIVE", or "INCLUSIVE_WITH_COMMENTS". Defaults to "EXCLUSIVE".
- client
Id string - The unique ID of this client, referenced in the URI during authentication and in issued tokens.
- client
Signature booleanRequired - When
true
, Keycloak will expect that documents originating from a client will be signed using the certificate and/or key configured viasigning_certificate
andsigning_private_key
. Defaults totrue
. - description string
- The description of this client in the GUI.
- enabled boolean
- When false, this client will not be able to initiate a login or obtain access tokens. Defaults to
true
. - encrypt
Assertions boolean - When
true
, the SAML assertions will be encrypted by Keycloak using the client's public key. Defaults tofalse
. - encryption
Certificate string - If assertions for the client are encrypted, this certificate will be used for encryption.
- encryption
Certificate stringSha1 - (Computed) The sha1sum fingerprint of the encryption certificate. If the encryption certificate is not in correct base64 format, this will be left empty.
- extra
Config {[key: string]: string} - force
Name booleanId Format - Ignore requested NameID subject format and use the one defined in
name_id_format
instead. Defaults tofalse
. - force
Post booleanBinding - When
true
, Keycloak will always respond to an authentication request via the SAML POST Binding. Defaults totrue
. - front
Channel booleanLogout - When
true
, this client will require a browser redirect in order to perform a logout. Defaults totrue
. - full
Scope booleanAllowed - Allow to include all roles mappings in the access token
- idp
Initiated stringSso Relay State - Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
- idp
Initiated stringSso Url Name - URL fragment name to reference client when you want to do IDP Initiated SSO.
- include
Authn booleanStatement - When
true
, anAuthnStatement
will be included in the SAML response. Defaults totrue
. - login
Theme string - The login theme of this client.
- logout
Service stringPost Binding Url - SAML POST Binding URL for the client's single logout service.
- logout
Service stringRedirect Binding Url - SAML Redirect Binding URL for the client's single logout service.
- master
Saml stringProcessing Url - When specified, this URL will be used for all SAML requests.
- name string
- The display name of this client in the GUI.
- name
Id stringFormat - Sets the Name ID format for the subject.
- realm
Id string - The realm this client is attached to.
- root
Url string - When specified, this value is prepended to all relative URLs.
- sign
Assertions boolean - When
true
, the SAML assertions will be signed by Keycloak using the realm's private key, and embedded within the SAML XML Auth response. Defaults tofalse
. - sign
Documents boolean - When
true
, the SAML document will be signed by Keycloak using the realm's private key. Defaults totrue
. - signature
Algorithm string - The signature algorithm used to sign documents. Should be one of "RSA_SHA1", "RSA_SHA256", "RSA_SHA256_MGF1, "RSA_SHA512", "RSA_SHA512_MGF1" or "DSA_SHA1".
- signature
Key stringName - The value of the
KeyName
element within the signed SAML document. Should be one of "NONE", "KEY_ID", or "CERT_SUBJECT". Defaults to "KEY_ID". - signing
Certificate string - If documents or assertions from the client are signed, this certificate will be used to verify the signature.
- signing
Certificate stringSha1 - (Computed) The sha1sum fingerprint of the signing certificate. If the signing certificate is not in correct base64 format, this will be left empty.
- signing
Private stringKey - If documents or assertions from the client are signed, this private key will be used to verify the signature.
- signing
Private stringKey Sha1 - (Computed) The sha1sum fingerprint of the signing private key. If the signing private key is not in correct base64 format, this will be left empty.
- valid
Redirect string[]Uris - When specified, Keycloak will use this list to validate given Assertion Consumer URLs specified in the authentication request.
- assertion_
consumer_ strpost_ url - SAML POST Binding URL for the client's assertion consumer service (login responses).
- assertion_
consumer_ strredirect_ url - SAML Redirect Binding URL for the client's assertion consumer service (login responses).
- authentication_
flow_ Clientbinding_ overrides Authentication Flow Binding Overrides Args - Override realm authentication flow bindings
- base_
url str - When specified, this URL will be used whenever Keycloak needs to link to this client.
- canonicalization_
method str - The Canonicalization Method for XML signatures. Should be one of "EXCLUSIVE", "EXCLUSIVE_WITH_COMMENTS", "INCLUSIVE", or "INCLUSIVE_WITH_COMMENTS". Defaults to "EXCLUSIVE".
- client_
id str - The unique ID of this client, referenced in the URI during authentication and in issued tokens.
- client_
signature_ boolrequired - When
true
, Keycloak will expect that documents originating from a client will be signed using the certificate and/or key configured viasigning_certificate
andsigning_private_key
. Defaults totrue
. - description str
- The description of this client in the GUI.
- enabled bool
- When false, this client will not be able to initiate a login or obtain access tokens. Defaults to
true
. - encrypt_
assertions bool - When
true
, the SAML assertions will be encrypted by Keycloak using the client's public key. Defaults tofalse
. - encryption_
certificate str - If assertions for the client are encrypted, this certificate will be used for encryption.
- encryption_
certificate_ strsha1 - (Computed) The sha1sum fingerprint of the encryption certificate. If the encryption certificate is not in correct base64 format, this will be left empty.
- extra_
config Mapping[str, str] - force_
name_ boolid_ format - Ignore requested NameID subject format and use the one defined in
name_id_format
instead. Defaults tofalse
. - force_
post_ boolbinding - When
true
, Keycloak will always respond to an authentication request via the SAML POST Binding. Defaults totrue
. - front_
channel_ boollogout - When
true
, this client will require a browser redirect in order to perform a logout. Defaults totrue
. - full_
scope_ boolallowed - Allow to include all roles mappings in the access token
- idp_
initiated_ strsso_ relay_ state - Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
- idp_
initiated_ strsso_ url_ name - URL fragment name to reference client when you want to do IDP Initiated SSO.
- include_
authn_ boolstatement - When
true
, anAuthnStatement
will be included in the SAML response. Defaults totrue
. - login_
theme str - The login theme of this client.
- logout_
service_ strpost_ binding_ url - SAML POST Binding URL for the client's single logout service.
- logout_
service_ strredirect_ binding_ url - SAML Redirect Binding URL for the client's single logout service.
- master_
saml_ strprocessing_ url - When specified, this URL will be used for all SAML requests.
- name str
- The display name of this client in the GUI.
- name_
id_ strformat - Sets the Name ID format for the subject.
- realm_
id str - The realm this client is attached to.
- root_
url str - When specified, this value is prepended to all relative URLs.
- sign_
assertions bool - When
true
, the SAML assertions will be signed by Keycloak using the realm's private key, and embedded within the SAML XML Auth response. Defaults tofalse
. - sign_
documents bool - When
true
, the SAML document will be signed by Keycloak using the realm's private key. Defaults totrue
. - signature_
algorithm str - The signature algorithm used to sign documents. Should be one of "RSA_SHA1", "RSA_SHA256", "RSA_SHA256_MGF1, "RSA_SHA512", "RSA_SHA512_MGF1" or "DSA_SHA1".
- signature_
key_ strname - The value of the
KeyName
element within the signed SAML document. Should be one of "NONE", "KEY_ID", or "CERT_SUBJECT". Defaults to "KEY_ID". - signing_
certificate str - If documents or assertions from the client are signed, this certificate will be used to verify the signature.
- signing_
certificate_ strsha1 - (Computed) The sha1sum fingerprint of the signing certificate. If the signing certificate is not in correct base64 format, this will be left empty.
- signing_
private_ strkey - If documents or assertions from the client are signed, this private key will be used to verify the signature.
- signing_
private_ strkey_ sha1 - (Computed) The sha1sum fingerprint of the signing private key. If the signing private key is not in correct base64 format, this will be left empty.
- valid_
redirect_ Sequence[str]uris - When specified, Keycloak will use this list to validate given Assertion Consumer URLs specified in the authentication request.
- assertion
Consumer StringPost Url - SAML POST Binding URL for the client's assertion consumer service (login responses).
- assertion
Consumer StringRedirect Url - SAML Redirect Binding URL for the client's assertion consumer service (login responses).
- authentication
Flow Property MapBinding Overrides - Override realm authentication flow bindings
- base
Url String - When specified, this URL will be used whenever Keycloak needs to link to this client.
- canonicalization
Method String - The Canonicalization Method for XML signatures. Should be one of "EXCLUSIVE", "EXCLUSIVE_WITH_COMMENTS", "INCLUSIVE", or "INCLUSIVE_WITH_COMMENTS". Defaults to "EXCLUSIVE".
- client
Id String - The unique ID of this client, referenced in the URI during authentication and in issued tokens.
- client
Signature BooleanRequired - When
true
, Keycloak will expect that documents originating from a client will be signed using the certificate and/or key configured viasigning_certificate
andsigning_private_key
. Defaults totrue
. - description String
- The description of this client in the GUI.
- enabled Boolean
- When false, this client will not be able to initiate a login or obtain access tokens. Defaults to
true
. - encrypt
Assertions Boolean - When
true
, the SAML assertions will be encrypted by Keycloak using the client's public key. Defaults tofalse
. - encryption
Certificate String - If assertions for the client are encrypted, this certificate will be used for encryption.
- encryption
Certificate StringSha1 - (Computed) The sha1sum fingerprint of the encryption certificate. If the encryption certificate is not in correct base64 format, this will be left empty.
- extra
Config Map<String> - force
Name BooleanId Format - Ignore requested NameID subject format and use the one defined in
name_id_format
instead. Defaults tofalse
. - force
Post BooleanBinding - When
true
, Keycloak will always respond to an authentication request via the SAML POST Binding. Defaults totrue
. - front
Channel BooleanLogout - When
true
, this client will require a browser redirect in order to perform a logout. Defaults totrue
. - full
Scope BooleanAllowed - Allow to include all roles mappings in the access token
- idp
Initiated StringSso Relay State - Relay state you want to send with SAML request when you want to do IDP Initiated SSO.
- idp
Initiated StringSso Url Name - URL fragment name to reference client when you want to do IDP Initiated SSO.
- include
Authn BooleanStatement - When
true
, anAuthnStatement
will be included in the SAML response. Defaults totrue
. - login
Theme String - The login theme of this client.
- logout
Service StringPost Binding Url - SAML POST Binding URL for the client's single logout service.
- logout
Service StringRedirect Binding Url - SAML Redirect Binding URL for the client's single logout service.
- master
Saml StringProcessing Url - When specified, this URL will be used for all SAML requests.
- name String
- The display name of this client in the GUI.
- name
Id StringFormat - Sets the Name ID format for the subject.
- realm
Id String - The realm this client is attached to.
- root
Url String - When specified, this value is prepended to all relative URLs.
- sign
Assertions Boolean - When
true
, the SAML assertions will be signed by Keycloak using the realm's private key, and embedded within the SAML XML Auth response. Defaults tofalse
. - sign
Documents Boolean - When
true
, the SAML document will be signed by Keycloak using the realm's private key. Defaults totrue
. - signature
Algorithm String - The signature algorithm used to sign documents. Should be one of "RSA_SHA1", "RSA_SHA256", "RSA_SHA256_MGF1, "RSA_SHA512", "RSA_SHA512_MGF1" or "DSA_SHA1".
- signature
Key StringName - The value of the
KeyName
element within the signed SAML document. Should be one of "NONE", "KEY_ID", or "CERT_SUBJECT". Defaults to "KEY_ID". - signing
Certificate String - If documents or assertions from the client are signed, this certificate will be used to verify the signature.
- signing
Certificate StringSha1 - (Computed) The sha1sum fingerprint of the signing certificate. If the signing certificate is not in correct base64 format, this will be left empty.
- signing
Private StringKey - If documents or assertions from the client are signed, this private key will be used to verify the signature.
- signing
Private StringKey Sha1 - (Computed) The sha1sum fingerprint of the signing private key. If the signing private key is not in correct base64 format, this will be left empty.
- valid
Redirect List<String>Uris - When specified, Keycloak will use this list to validate given Assertion Consumer URLs specified in the authentication request.
Supporting Types
ClientAuthenticationFlowBindingOverrides, ClientAuthenticationFlowBindingOverridesArgs
- Browser
Id string - Browser flow id, (flow needs to exist)
- Direct
Grant stringId - Direct grant flow id (flow needs to exist)
- Browser
Id string - Browser flow id, (flow needs to exist)
- Direct
Grant stringId - Direct grant flow id (flow needs to exist)
- browser
Id String - Browser flow id, (flow needs to exist)
- direct
Grant StringId - Direct grant flow id (flow needs to exist)
- browser
Id string - Browser flow id, (flow needs to exist)
- direct
Grant stringId - Direct grant flow id (flow needs to exist)
- browser_
id str - Browser flow id, (flow needs to exist)
- direct_
grant_ strid - Direct grant flow id (flow needs to exist)
- browser
Id String - Browser flow id, (flow needs to exist)
- direct
Grant StringId - Direct grant flow id (flow needs to exist)
Import
Clients can be imported using the format {{realm_id}}/{{client_keycloak_id}}
, where client_keycloak_id
is the unique ID that Keycloak
assigns to the client upon creation. This value can be found in the URI when editing this client in the GUI, and is typically a GUID.
Example:
bash
$ pulumi import keycloak:saml/client:Client saml_client my-realm/dcbc4c73-e478-4928-ae2e-d5e420223352
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Keycloak pulumi/pulumi-keycloak
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
keycloak
Terraform Provider.