Update OIDC Configuration
PUT/authn/api/v1/oauth2/config
Updates all the parameters of an existing OAuth2 configuration that is used by OpenID Connect(OIDC).
Request
- application/json
Body
required
Client ID obtained after Identity Provider(IdP) configuration.
Secret for the client id
The identifier of the OpenID Connect(OIDC) provider.
Identifiers used to specify what access privileges are being requested.
Possible values: [authorization_code
]
Grant types are a way to specify how a client wants to interact with an Identity Provider(IdP).
Possible values: [true
, false
]
Using proof key for code exchange(PKCE) as additional verification. PKCE ensures that only the client that requests the access token can redeem it.
The URL of the authentication endpoint on the Identity Provider(IdP).
The Identity Provider token endpoint URL for obtaining access and ID tokens.
The URL of the Identity Provider(IdP) JSON Web Key Set document.This document contains signing keys that are used to validate the signatures from the provider.
The URL used to sign out the user from the Identity Provider(IdP).
Possible values: [true
, false
]
True to enable SSO using OIDC; False otherwise.
Possible values: [true
, false
]
Is JIT enabled
Token claim providing the name of Prisma Cloud role for user.
Default Prisma Cloud role to use for JIT when claim is missing or undefined.
Responses
- 204
- 400
- 401
- 403
- 429
Successful operation
Client error
Response Headers
x-redlock-status string
error description
- application/json
- Schema
- Example (from schema)
Schema
- Array [
- ]
errorDetails object[]
{
"timestamp": "string",
"status": 0,
"error": "string",
"errorDetails": [
{
"name": "string",
"message": "string"
}
],
"message": "string",
"path": "string"
}
Authentication error
Authorization error
Too many requests