Get SAML configuration
Retrieves a single SAML security realm configuration.
Responses
-
The SAML configuration was successfully retrieved
Hide headers attributes Show headers attributes
-
The resource version, which is used to avoid update conflicts with concurrent operations
-
The date-time when the resource was created (ISO format relative to UTC)
-
The date-time when the resource was last modified (ISO format relative to UTC)
Hide response attributes Show response attributes object
-
The identifier for the security realm
-
The friendly name of the security realm
-
The SAML Identity Provider configuration
Hide idp attributes Show idp attributes object
-
The Entity ID of the SAML Identity Provider. An Entity ID is a URI with a maximum length of 1024 characters. It can be a URL or a URN and can be found in the configuration or the SAML metadata of the Identity Provider.
-
The URL to a SAML 2.0 metadata file describing the capabilities and configuration of the Identity Provider
-
Indicates whether to utilise the Identity Provider's Single Logout service
-
-
The SAML Service Provider configuration
-
The SAML attribute mapping configuration
Hide attributes attributes Show attributes attributes object
-
The name of the SAML attribute that contains the user's principal (username). This name should map to a value that does not contain commas or slashes.
-
The name of the SAML attribute that contains the user's groups
-
The name of the SAML attribute that contains the user's full name
-
The name of the SAML attribute that contains the user's email address
-
The name of the SAML attribute that contains the user's X.50 Distinguished Name
-
-
The NameID format. If not specified the IdP default is used. Example: 'urn:oasis:names:tc:SAML:2.0:nameid-format:persistent'
-
The role mapping rules associated with the security realm
Hide role_mappings attributes Show role_mappings attributes object
-
The default roles applied to all users
-
The role mapping rules to evaluate
The mapping rule for the Elasticsearch security SAML role.
Hide rules attributes Show rules attributes object
-
-
When true, enables the security realm
-
The order that the security realm is evaluated
-
Specifies whether to set the ForceAuthn attribute when requesting that the IdP authenticate the current user. If set to true, the IdP is required to verify the user's identity, irrespective of any existing sessions they might have.
-
The SAML signing certificate bundle URL. The bundle should be a zip file containing 'signing.key' and 'signing.pem' files in the directory '/saml/:id', where :id is the value of the [id] field.
-
The password to the signing certificate bundle
-
A list of SAML message types that should be signed. Each element in the list should be the local name of a SAML XML Element. Supported element types are AuthnRequest, LogoutRequest and LogoutResponse. Only valid if a signing certificate is also specified.
-
The SAML encryption certificate bundle URL. The bundle should be a zip file containing 'encryption.key' and 'encryption.pem' files in the directory '/saml/:id', where :id is the value of the [id] field.
-
The password to the encryption certificate bundle
-
The SSL trusted CA certificate bundle URL. The bundle should be a zip file containing a single keystore file 'keystore.ks' Note that all keys should omit the 'xpack.security.authc.realms.saml.{realm_id}' prefix. For example, when the realm ID is set to 'saml1', the advanced configuration 'xpack.security.authc.realms.saml.saml1.ssl.verification_mode: full' should be added as 'ssl.verification_mode: full'.
-
The password to the SSL certificate bundle URL truststore
-
The format of the keystore file. Should be jks to use the Java Keystore format or PKCS12 to use PKCS#12 files. The default is jks.
Values are
jks
orPKCS12
. -
Advanced configuration options in YAML format. Any settings defined here will override any configuration set via the API. Note that all keys should omit 'xpack.security.authc.realms.{realm_type}.{realm_id}'.
-
-
The realm specified by {realm_id} cannot be found. (code:
security_realm.not_found
)Hide headers attribute Show headers attribute
Hide response attribute Show response attribute object
-
A list of errors that occurred in the failing request
Hide errors attributes Show errors attributes object
-
curl \
--request GET 'https://{{hostname}}/api/v1/platform/configuration/security/realms/saml/{realm_id}' \
--user "username:password"