Step 6: Create the new identity provider in the destination environment
POST {{apiPath}}/environments/{{destinationEnvID}}/identityProviders
Create the new IdP in the destination environment using the POST {{apiPath}}/environments/{{destinationEnvID}}/identityProviders endpoint to create the SAML IdP configuration.
-
The IdP
namemust be unique to the environment. -
Assign the same value for
spEntityIdthat you used for the source environment when you created the application. -
Set
idpEntityIdto a name that’s unique to the environment. -
Set
ssoEndpointto the URL that you’ll use for single sign-on (SSO). -
Set
authnRequestSignedto false. -
Set
idpVerification.certificates[].idto the verification certificate ID for the destination environment that you copied in the previous step.
Body
raw ( application/json )
{
"name": "SAML test identity provider",
"description": "this is SAML IdP test",
"type": "SAML",
"enabled": true,
"spEntityId": "saml-test-idp_{{$timestamp}}",
"idpEntityId": "https://auth.pingone.com/{{destinationEnvID}}",
"ssoBinding": "HTTP_POST",
"ssoEndpoint": "https://auth.pingone.com/{{SourceEnvID}}/saml20/idp/sso",
"authnRequestSigned": "false",
"idpVerification": {
"certificates": [
{
"id": "{{destinationEnvCrtID}}"
}
]
}
}
Example Request
-
cURL
-
C#
-
Go
-
HTTP
-
Java
-
jQuery
-
NodeJS
-
Python
-
PHP
-
Ruby
-
Swift
curl --location --globoff '{{apiPath}}/environments/{{destinationEnvID}}/identityProviders' \
--header 'Content-Type: application/json' \
--header 'Authorization: Bearer {{accessToken}}' \
--data '{
"name": "SAML test identity provider",
"description": "this is SAML IdP test",
"type": "SAML",
"enabled": true,
"spEntityId": "saml-test-idp_{{$timestamp}}",
"idpEntityId": "https://auth.pingone.com/{{destinationEnvID}}",
"ssoBinding": "HTTP_POST",
"ssoEndpoint": "https://auth.pingone.com/{{SourceEnvID}}/saml20/idp/sso",
"authnRequestSigned": "false",
"idpVerification": {
"certificates": [
{
"id": "{{destinationEnvCrtID}}"
}
]
}
}'
var options = new RestClientOptions("{{apiPath}}/environments/{{destinationEnvID}}/identityProviders")
{
MaxTimeout = -1,
};
var client = new RestClient(options);
var request = new RestRequest("", Method.Post);
request.AddHeader("Content-Type", "application/json");
request.AddHeader("Authorization", "Bearer {{accessToken}}");
var body = @"{" + "\n" +
@" ""name"": ""SAML test identity provider""," + "\n" +
@" ""description"": ""this is SAML IdP test""," + "\n" +
@" ""type"": ""SAML""," + "\n" +
@" ""enabled"": true," + "\n" +
@" ""spEntityId"": ""saml-test-idp_{{$timestamp}}""," + "\n" +
@" ""idpEntityId"": ""https://auth.pingone.com/{{destinationEnvID}}""," + "\n" +
@" ""ssoBinding"": ""HTTP_POST""," + "\n" +
@" ""ssoEndpoint"": ""https://auth.pingone.com/{{SourceEnvID}}/saml20/idp/sso""," + "\n" +
@" ""authnRequestSigned"": ""false""," + "\n" +
@" ""idpVerification"": {" + "\n" +
@" ""certificates"": [" + "\n" +
@" {" + "\n" +
@" ""id"": ""{{destinationEnvCrtID}}""" + "\n" +
@" }" + "\n" +
@" ]" + "\n" +
@" }" + "\n" +
@"}";
request.AddStringBody(body, DataFormat.Json);
RestResponse response = await client.ExecuteAsync(request);
Console.WriteLine(response.Content);
package main
import (
"fmt"
"strings"
"net/http"
"io"
)
func main() {
url := "{{apiPath}}/environments/{{destinationEnvID}}/identityProviders"
method := "POST"
payload := strings.NewReader(`{
"name": "SAML test identity provider",
"description": "this is SAML IdP test",
"type": "SAML",
"enabled": true,
"spEntityId": "saml-test-idp_{{$timestamp}}",
"idpEntityId": "https://auth.pingone.com/{{destinationEnvID}}",
"ssoBinding": "HTTP_POST",
"ssoEndpoint": "https://auth.pingone.com/{{SourceEnvID}}/saml20/idp/sso",
"authnRequestSigned": "false",
"idpVerification": {
"certificates": [
{
"id": "{{destinationEnvCrtID}}"
}
]
}
}`)
client := &http.Client {
}
req, err := http.NewRequest(method, url, payload)
if err != nil {
fmt.Println(err)
return
}
req.Header.Add("Content-Type", "application/json")
req.Header.Add("Authorization", "Bearer {{accessToken}}")
res, err := client.Do(req)
if err != nil {
fmt.Println(err)
return
}
defer res.Body.Close()
body, err := io.ReadAll(res.Body)
if err != nil {
fmt.Println(err)
return
}
fmt.Println(string(body))
}
POST /environments/{{destinationEnvID}}/identityProviders HTTP/1.1
Host: {{apiPath}}
Content-Type: application/json
Authorization: Bearer {{accessToken}}
{
"name": "SAML test identity provider",
"description": "this is SAML IdP test",
"type": "SAML",
"enabled": true,
"spEntityId": "saml-test-idp_{{$timestamp}}",
"idpEntityId": "https://auth.pingone.com/{{destinationEnvID}}",
"ssoBinding": "HTTP_POST",
"ssoEndpoint": "https://auth.pingone.com/{{SourceEnvID}}/saml20/idp/sso",
"authnRequestSigned": "false",
"idpVerification": {
"certificates": [
{
"id": "{{destinationEnvCrtID}}"
}
]
}
}
OkHttpClient client = new OkHttpClient().newBuilder()
.build();
MediaType mediaType = MediaType.parse("application/json");
RequestBody body = RequestBody.create(mediaType, "{\n \"name\": \"SAML test identity provider\",\n \"description\": \"this is SAML IdP test\",\n \"type\": \"SAML\",\n \"enabled\": true,\n \"spEntityId\": \"saml-test-idp_{{$timestamp}}\",\n \"idpEntityId\": \"https://auth.pingone.com/{{destinationEnvID}}\",\n \"ssoBinding\": \"HTTP_POST\",\n \"ssoEndpoint\": \"https://auth.pingone.com/{{SourceEnvID}}/saml20/idp/sso\",\n \"authnRequestSigned\": \"false\",\n \"idpVerification\": {\n \"certificates\": [\n {\n \"id\": \"{{destinationEnvCrtID}}\"\n }\n ]\n }\n}");
Request request = new Request.Builder()
.url("{{apiPath}}/environments/{{destinationEnvID}}/identityProviders")
.method("POST", body)
.addHeader("Content-Type", "application/json")
.addHeader("Authorization", "Bearer {{accessToken}}")
.build();
Response response = client.newCall(request).execute();
var settings = {
"url": "{{apiPath}}/environments/{{destinationEnvID}}/identityProviders",
"method": "POST",
"timeout": 0,
"headers": {
"Content-Type": "application/json",
"Authorization": "Bearer {{accessToken}}"
},
"data": JSON.stringify({
"name": "SAML test identity provider",
"description": "this is SAML IdP test",
"type": "SAML",
"enabled": true,
"spEntityId": "saml-test-idp_{{$timestamp}}",
"idpEntityId": "https://auth.pingone.com/{{destinationEnvID}}",
"ssoBinding": "HTTP_POST",
"ssoEndpoint": "https://auth.pingone.com/{{SourceEnvID}}/saml20/idp/sso",
"authnRequestSigned": "false",
"idpVerification": {
"certificates": [
{
"id": "{{destinationEnvCrtID}}"
}
]
}
}),
};
$.ajax(settings).done(function (response) {
console.log(response);
});
var request = require('request');
var options = {
'method': 'POST',
'url': '{{apiPath}}/environments/{{destinationEnvID}}/identityProviders',
'headers': {
'Content-Type': 'application/json',
'Authorization': 'Bearer {{accessToken}}'
},
body: JSON.stringify({
"name": "SAML test identity provider",
"description": "this is SAML IdP test",
"type": "SAML",
"enabled": true,
"spEntityId": "saml-test-idp_{{$timestamp}}",
"idpEntityId": "https://auth.pingone.com/{{destinationEnvID}}",
"ssoBinding": "HTTP_POST",
"ssoEndpoint": "https://auth.pingone.com/{{SourceEnvID}}/saml20/idp/sso",
"authnRequestSigned": "false",
"idpVerification": {
"certificates": [
{
"id": "{{destinationEnvCrtID}}"
}
]
}
})
};
request(options, function (error, response) {
if (error) throw new Error(error);
console.log(response.body);
});
import requests
import json
url = "{{apiPath}}/environments/{{destinationEnvID}}/identityProviders"
payload = json.dumps({
"name": "SAML test identity provider",
"description": "this is SAML IdP test",
"type": "SAML",
"enabled": True,
"spEntityId": "saml-test-idp_{{$timestamp}}",
"idpEntityId": "https://auth.pingone.com/{{destinationEnvID}}",
"ssoBinding": "HTTP_POST",
"ssoEndpoint": "https://auth.pingone.com/{{SourceEnvID}}/saml20/idp/sso",
"authnRequestSigned": "false",
"idpVerification": {
"certificates": [
{
"id": "{{destinationEnvCrtID}}"
}
]
}
})
headers = {
'Content-Type': 'application/json',
'Authorization': 'Bearer {{accessToken}}'
}
response = requests.request("POST", url, headers=headers, data=payload)
print(response.text)
<?php
require_once 'HTTP/Request2.php';
$request = new HTTP_Request2();
$request->setUrl('{{apiPath}}/environments/{{destinationEnvID}}/identityProviders');
$request->setMethod(HTTP_Request2::METHOD_POST);
$request->setConfig(array(
'follow_redirects' => TRUE
));
$request->setHeader(array(
'Content-Type' => 'application/json',
'Authorization' => 'Bearer {{accessToken}}'
));
$request->setBody('{\n "name": "SAML test identity provider",\n "description": "this is SAML IdP test",\n "type": "SAML",\n "enabled": true,\n "spEntityId": "saml-test-idp_{{$timestamp}}",\n "idpEntityId": "https://auth.pingone.com/{{destinationEnvID}}",\n "ssoBinding": "HTTP_POST",\n "ssoEndpoint": "https://auth.pingone.com/{{SourceEnvID}}/saml20/idp/sso",\n "authnRequestSigned": "false",\n "idpVerification": {\n "certificates": [\n {\n "id": "{{destinationEnvCrtID}}"\n }\n ]\n }\n}');
try {
$response = $request->send();
if ($response->getStatus() == 200) {
echo $response->getBody();
}
else {
echo 'Unexpected HTTP status: ' . $response->getStatus() . ' ' .
$response->getReasonPhrase();
}
}
catch(HTTP_Request2_Exception $e) {
echo 'Error: ' . $e->getMessage();
}
require "uri"
require "json"
require "net/http"
url = URI("{{apiPath}}/environments/{{destinationEnvID}}/identityProviders")
http = Net::HTTP.new(url.host, url.port);
request = Net::HTTP::Post.new(url)
request["Content-Type"] = "application/json"
request["Authorization"] = "Bearer {{accessToken}}"
request.body = JSON.dump({
"name": "SAML test identity provider",
"description": "this is SAML IdP test",
"type": "SAML",
"enabled": true,
"spEntityId": "saml-test-idp_{{\$timestamp}}",
"idpEntityId": "https://auth.pingone.com/{{destinationEnvID}}",
"ssoBinding": "HTTP_POST",
"ssoEndpoint": "https://auth.pingone.com/{{SourceEnvID}}/saml20/idp/sso",
"authnRequestSigned": "false",
"idpVerification": {
"certificates": [
{
"id": "{{destinationEnvCrtID}}"
}
]
}
})
response = http.request(request)
puts response.read_body
let parameters = "{\n \"name\": \"SAML test identity provider\",\n \"description\": \"this is SAML IdP test\",\n \"type\": \"SAML\",\n \"enabled\": true,\n \"spEntityId\": \"saml-test-idp_{{$timestamp}}\",\n \"idpEntityId\": \"https://auth.pingone.com/{{destinationEnvID}}\",\n \"ssoBinding\": \"HTTP_POST\",\n \"ssoEndpoint\": \"https://auth.pingone.com/{{SourceEnvID}}/saml20/idp/sso\",\n \"authnRequestSigned\": \"false\",\n \"idpVerification\": {\n \"certificates\": [\n {\n \"id\": \"{{destinationEnvCrtID}}\"\n }\n ]\n }\n}"
let postData = parameters.data(using: .utf8)
var request = URLRequest(url: URL(string: "{{apiPath}}/environments/{{destinationEnvID}}/identityProviders")!,timeoutInterval: Double.infinity)
request.addValue("application/json", forHTTPHeaderField: "Content-Type")
request.addValue("Bearer {{accessToken}}", forHTTPHeaderField: "Authorization")
request.httpMethod = "POST"
request.httpBody = postData
let task = URLSession.shared.dataTask(with: request) { data, response, error in
guard let data = data else {
print(String(describing: error))
return
}
print(String(data: data, encoding: .utf8)!)
}
task.resume()
Example Response
201 Created
{
"_links": {
"self": {
"href": "https://api.pingone.com/v1/environments/abfba8f6-49eb-49f5-a5d9-80ad5c98f9f6/identityProviders/1805a64b-9ace-4afd-81ca-23d724d14540"
},
"environment": {
"href": "https://api.pingone.com/v1/environments/abfba8f6-49eb-49f5-a5d9-80ad5c98f9f6"
},
"attributes": {
"href": "https://api.pingone.com/v1/environments/abfba8f6-49eb-49f5-a5d9-80ad5c98f9f6/identityProviders/1805a64b-9ace-4afd-81ca-23d724d14540/attributes"
}
},
"id": "1805a64b-9ace-4afd-81ca-23d724d14540",
"type": "SAML",
"name": "SAML test identity provider",
"description": "this is SAML IdP test",
"enabled": true,
"environment": {
"id": "abfba8f6-49eb-49f5-a5d9-80ad5c98f9f6"
},
"createdAt": "2020-11-03T19:11:16.988Z",
"updatedAt": "2020-11-03T19:11:16.988Z",
"authnRequestSigned": false,
"ssoEndpoint": "https://auth.pingone.com/{SourceEnvID}/saml20/idp/sso",
"ssoBinding": "HTTP_POST",
"idpVerification": {
"certificates": [
{
"id": "735a195e-464f-4560-a0a8-611f9996e667"
}
]
},
"spEntityId": "saml-test-idp",
"idpEntityId": "https://auth.pingone.com/{destinationEnvID}"
}