Returns the global SAML configuration
This request has no parameters.
returned if global SAML configuration was successfully retrieved
any
1
2
3
curl --request GET \
--url 'http://{baseurl}/rest/rest/admin/1.0/samlconfig' \
--header 'Accept: application/json'
Parses application metadata.
search criteria
object
returned if application SAML configuration was successfully retrieved
any
1
2
3
curl --request POST \
--url 'http://{baseurl}/rest/rest/admin/1.0/samlconfig/application/parse_metadata' \
--header 'Accept: application/json'
1
2
3
4
5
6
7
{
"entityId": "http://my.service.com",
"assertionConsumerUrl": "http://my.service.com/SAML2/SSO/POST",
"enabled": null,
"nameIdFormat": "UNSPECIFIED",
"addUserAttributesEnabled": false
}
Parses application metadata.
search criteria
string
boolean
object
string
integer
string
returned if application SAML configuration was successfully retrieved
any
1
2
3
curl --request POST \
--url 'http://{baseurl}/rest/rest/admin/1.0/samlconfig/application/parse_metadata_multipart' \
--header 'Accept: application/json'
1
2
3
4
5
6
7
{
"entityId": "http://my.service.com",
"assertionConsumerUrl": "http://my.service.com/SAML2/SSO/POST",
"enabled": null,
"nameIdFormat": "UNSPECIFIED",
"addUserAttributesEnabled": false
}
Returns SAML configuration
integer
Requiredreturned if application SAML configuration was successfully retrieved
any
1
2
3
curl --request GET \
--url 'http://{baseurl}/rest/rest/admin/1.0/samlconfig/application/{applicationId}' \
--header 'Accept: application/json'
1
2
3
4
5
6
7
{
"entityId": "http://my.service.com",
"assertionConsumerUrl": "http://my.service.com/SAML2/SSO/POST",
"enabled": true,
"nameIdFormat": "UNSPECIFIED",
"addUserAttributesEnabled": false
}
Updates SAML configuration for a specified application
integer
RequiredEntity for application SAML configuration
boolean
string
boolean
string
string
returned if application SAML configuration was successfully created
1
2
3
4
5
6
7
8
9
10
curl --request POST \
--url 'http://{baseurl}/rest/rest/admin/1.0/samlconfig/application/{applicationId}' \
--header 'Content-Type: application/json' \
--data '{
"entityId": "http://my.service.com",
"assertionConsumerUrl": "http://my.service.com/SAML2/SSO/POST",
"enabled": true,
"nameIdFormat": "UNSPECIFIED",
"addUserAttributesEnabled": false
}'
Compares the directory mappings of application with crowd application
integer
Requiredreturned if a mismatch is found
any
1
2
3
curl --request GET \
--url 'http://{baseurl}/rest/rest/admin/1.0/samlconfig/application/{applicationId}/directory-mapping-mismatch' \
--header 'Accept: application/json'
1
2
3
4
{
"entity": null,
"reason": "Directory mappings in Crowd and Jira are not same"
}
Returns Identity provider's metadata
This request has no parameters.
returned if application SAML configuration was successfully retrieved
any
1
2
3
curl --request GET \
--url 'http://{baseurl}/rest/rest/admin/1.0/samlconfig/idp/metadata' \
--header 'Accept: application/xml'
Replaces the private key/certificate pair used for signing/verifying assertions with a new one
This request has no parameters.
returned if replacing key/certificate pair and fetching SAML configuration succeeded
any
1
2
3
curl --request POST \
--url 'http://{baseurl}/rest/rest/admin/1.0/samlconfig/reset-certificates' \
--header 'Accept: application/json'
Rate this page: