published on Tuesday, Apr 28, 2026 by Piers Karsenbarg
published on Tuesday, Apr 28, 2026 by Piers Karsenbarg
Provides a resource to Create a SAML Identity Provider.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as nutanix from "@pierskarsenbarg/nutanix";
const idp = new nutanix.SamlIdentityProvidersV2("idp", {
name: "example_idp_name",
idpMetadatas: [{
entityId: "entity_id",
loginUrl: "login_url",
logoutUrl: "logout_url",
errorUrl: "error_url",
certificate: "certificate",
}],
usernameAttribute: "username",
emailAttribute: "email",
groupsAttribute: "groups",
groupsDelim: ",",
idpMetadataXml: "<IDENTITY_PROVIDER_METADATA_XML content>",
entityIssuer: "entity_issuer_issuer",
isSignedAuthnReqEnabled: true,
customAttributes: [
"custom1",
"custom2",
],
});
import pulumi
import pulumi_nutanix as nutanix
idp = nutanix.SamlIdentityProvidersV2("idp",
name="example_idp_name",
idp_metadatas=[{
"entity_id": "entity_id",
"login_url": "login_url",
"logout_url": "logout_url",
"error_url": "error_url",
"certificate": "certificate",
}],
username_attribute="username",
email_attribute="email",
groups_attribute="groups",
groups_delim=",",
idp_metadata_xml="<IDENTITY_PROVIDER_METADATA_XML content>",
entity_issuer="entity_issuer_issuer",
is_signed_authn_req_enabled=True,
custom_attributes=[
"custom1",
"custom2",
])
package main
import (
"github.com/pierskarsenbarg/pulumi-nutanix/sdk/go/nutanix"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := nutanix.NewSamlIdentityProvidersV2(ctx, "idp", &nutanix.SamlIdentityProvidersV2Args{
Name: pulumi.String("example_idp_name"),
IdpMetadatas: nutanix.SamlIdentityProvidersV2IdpMetadataArray{
&nutanix.SamlIdentityProvidersV2IdpMetadataArgs{
EntityId: pulumi.String("entity_id"),
LoginUrl: pulumi.String("login_url"),
LogoutUrl: pulumi.String("logout_url"),
ErrorUrl: pulumi.String("error_url"),
Certificate: pulumi.String("certificate"),
},
},
UsernameAttribute: pulumi.String("username"),
EmailAttribute: pulumi.String("email"),
GroupsAttribute: pulumi.String("groups"),
GroupsDelim: pulumi.String(","),
IdpMetadataXml: pulumi.String("<IDENTITY_PROVIDER_METADATA_XML content>"),
EntityIssuer: pulumi.String("entity_issuer_issuer"),
IsSignedAuthnReqEnabled: pulumi.Bool(true),
CustomAttributes: pulumi.StringArray{
pulumi.String("custom1"),
pulumi.String("custom2"),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Nutanix = PiersKarsenbarg.Nutanix;
return await Deployment.RunAsync(() =>
{
var idp = new Nutanix.Index.SamlIdentityProvidersV2("idp", new()
{
Name = "example_idp_name",
IdpMetadatas = new[]
{
new Nutanix.Inputs.SamlIdentityProvidersV2IdpMetadataArgs
{
EntityId = "entity_id",
LoginUrl = "login_url",
LogoutUrl = "logout_url",
ErrorUrl = "error_url",
Certificate = "certificate",
},
},
UsernameAttribute = "username",
EmailAttribute = "email",
GroupsAttribute = "groups",
GroupsDelim = ",",
IdpMetadataXml = "<IDENTITY_PROVIDER_METADATA_XML content>",
EntityIssuer = "entity_issuer_issuer",
IsSignedAuthnReqEnabled = true,
CustomAttributes = new[]
{
"custom1",
"custom2",
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.nutanix.SamlIdentityProvidersV2;
import com.pulumi.nutanix.SamlIdentityProvidersV2Args;
import com.pulumi.nutanix.inputs.SamlIdentityProvidersV2IdpMetadataArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var idp = new SamlIdentityProvidersV2("idp", SamlIdentityProvidersV2Args.builder()
.name("example_idp_name")
.idpMetadatas(SamlIdentityProvidersV2IdpMetadataArgs.builder()
.entityId("entity_id")
.loginUrl("login_url")
.logoutUrl("logout_url")
.errorUrl("error_url")
.certificate("certificate")
.build())
.usernameAttribute("username")
.emailAttribute("email")
.groupsAttribute("groups")
.groupsDelim(",")
.idpMetadataXml("<IDENTITY_PROVIDER_METADATA_XML content>")
.entityIssuer("entity_issuer_issuer")
.isSignedAuthnReqEnabled(true)
.customAttributes(
"custom1",
"custom2")
.build());
}
}
resources:
idp:
type: nutanix:SamlIdentityProvidersV2
properties:
name: example_idp_name
idpMetadatas:
- entityId: entity_id
loginUrl: login_url
logoutUrl: logout_url
errorUrl: error_url
certificate: certificate
usernameAttribute: username
emailAttribute: email
groupsAttribute: groups
groupsDelim: ','
idpMetadataXml: <IDENTITY_PROVIDER_METADATA_XML content>
entityIssuer: entity_issuer_issuer
isSignedAuthnReqEnabled: true
customAttributes:
- custom1
- custom2
Argument Reference
The following arguments are supported:
extId: -(Optional) External identifier of the SAML Identity Provider.idpMetadataUrl: -(Optional) Metadata url that provides IDP details.idpMetadataXml: -(Optional) Base64 encoded metadata in XML format with IDP details.idpMetadata: -(Optional) Type of the User Group. LDAP (User Group belonging to a Directory Service (Open LDAP/AD)), SAML (User Group belonging to a SAML IDP.)name: -(Required) Unique name of the IDP.usernameAttr: -(Optional) SAML assertion Username attribute element.emailAttr: -(Optional) SAML assertion email attribute element.groupsAttr: -(Optional) SAML assertion groups attribute element.groupsDelim: -(Optional) Delimiter is used to split the value of attribute into multiple groups.customAttr: -(Optional) SAML assertions for list of custom attribute elements.entityIssuer: -(Optional) It will be used as Issuer in SAML authnRequest.isSignedAuthnReqEnabled: -(Optional) Flag indicating signing of SAML authnRequests.
Idp Metadata
The idpMetadata attribute supports the following:
entityId: -(Required) Entity Identifier of Identity provider.loginUrl: -(Required) Login URL of the Identity provider.logoutUrl: -(Optional) Logout URL of the Identity provider.errorUrl: - (Optional) Error URL of the Identity provider.certificate: -(Required) Certificate for verification.nameIdPolicyFormat: -(Optional) Name ID Policy format.- supported values:
emailAddress: - Uses email address as NameID formatencrypted: - Uses encrypted as NameID format.unspecified: - NameID format is left to individual implementations.transient: - Uses identifier with transient semantics as NameID format.WindowsDomainQualifiedName: - Uses Windows domain qualified name as NameID format.X509SubjectName: - Uses X509SubjectName as NameID format.kerberos: - Uses kerberos principal name as NameID format.persistent: - Uses persistent name identifier as NameID format.entity: - Uses identifier of an entity as NameID format.
- supported values:
Create SamlIdentityProvidersV2 Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SamlIdentityProvidersV2(name: string, args?: SamlIdentityProvidersV2Args, opts?: CustomResourceOptions);@overload
def SamlIdentityProvidersV2(resource_name: str,
args: Optional[SamlIdentityProvidersV2Args] = None,
opts: Optional[ResourceOptions] = None)
@overload
def SamlIdentityProvidersV2(resource_name: str,
opts: Optional[ResourceOptions] = None,
custom_attributes: Optional[Sequence[str]] = None,
email_attribute: Optional[str] = None,
entity_issuer: Optional[str] = None,
ext_id: Optional[str] = None,
groups_attribute: Optional[str] = None,
groups_delim: Optional[str] = None,
idp_metadata_url: Optional[str] = None,
idp_metadata_xml: Optional[str] = None,
idp_metadatas: Optional[Sequence[SamlIdentityProvidersV2IdpMetadataArgs]] = None,
is_signed_authn_req_enabled: Optional[bool] = None,
name: Optional[str] = None,
username_attribute: Optional[str] = None)func NewSamlIdentityProvidersV2(ctx *Context, name string, args *SamlIdentityProvidersV2Args, opts ...ResourceOption) (*SamlIdentityProvidersV2, error)public SamlIdentityProvidersV2(string name, SamlIdentityProvidersV2Args? args = null, CustomResourceOptions? opts = null)
public SamlIdentityProvidersV2(String name, SamlIdentityProvidersV2Args args)
public SamlIdentityProvidersV2(String name, SamlIdentityProvidersV2Args args, CustomResourceOptions options)
type: nutanix:SamlIdentityProvidersV2
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SamlIdentityProvidersV2Args
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SamlIdentityProvidersV2Args
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SamlIdentityProvidersV2Args
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SamlIdentityProvidersV2Args
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SamlIdentityProvidersV2Args
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var samlIdentityProvidersV2Resource = new Nutanix.SamlIdentityProvidersV2("samlIdentityProvidersV2Resource", new()
{
CustomAttributes = new[]
{
"string",
},
EmailAttribute = "string",
EntityIssuer = "string",
ExtId = "string",
GroupsAttribute = "string",
GroupsDelim = "string",
IdpMetadataUrl = "string",
IdpMetadataXml = "string",
IdpMetadatas = new[]
{
new Nutanix.Inputs.SamlIdentityProvidersV2IdpMetadataArgs
{
Certificate = "string",
EntityId = "string",
LoginUrl = "string",
ErrorUrl = "string",
LogoutUrl = "string",
NameIdPolicyFormat = "string",
},
},
IsSignedAuthnReqEnabled = false,
Name = "string",
UsernameAttribute = "string",
});
example, err := nutanix.NewSamlIdentityProvidersV2(ctx, "samlIdentityProvidersV2Resource", &nutanix.SamlIdentityProvidersV2Args{
CustomAttributes: pulumi.StringArray{
pulumi.String("string"),
},
EmailAttribute: pulumi.String("string"),
EntityIssuer: pulumi.String("string"),
ExtId: pulumi.String("string"),
GroupsAttribute: pulumi.String("string"),
GroupsDelim: pulumi.String("string"),
IdpMetadataUrl: pulumi.String("string"),
IdpMetadataXml: pulumi.String("string"),
IdpMetadatas: nutanix.SamlIdentityProvidersV2IdpMetadataArray{
&nutanix.SamlIdentityProvidersV2IdpMetadataArgs{
Certificate: pulumi.String("string"),
EntityId: pulumi.String("string"),
LoginUrl: pulumi.String("string"),
ErrorUrl: pulumi.String("string"),
LogoutUrl: pulumi.String("string"),
NameIdPolicyFormat: pulumi.String("string"),
},
},
IsSignedAuthnReqEnabled: pulumi.Bool(false),
Name: pulumi.String("string"),
UsernameAttribute: pulumi.String("string"),
})
var samlIdentityProvidersV2Resource = new SamlIdentityProvidersV2("samlIdentityProvidersV2Resource", SamlIdentityProvidersV2Args.builder()
.customAttributes("string")
.emailAttribute("string")
.entityIssuer("string")
.extId("string")
.groupsAttribute("string")
.groupsDelim("string")
.idpMetadataUrl("string")
.idpMetadataXml("string")
.idpMetadatas(SamlIdentityProvidersV2IdpMetadataArgs.builder()
.certificate("string")
.entityId("string")
.loginUrl("string")
.errorUrl("string")
.logoutUrl("string")
.nameIdPolicyFormat("string")
.build())
.isSignedAuthnReqEnabled(false)
.name("string")
.usernameAttribute("string")
.build());
saml_identity_providers_v2_resource = nutanix.SamlIdentityProvidersV2("samlIdentityProvidersV2Resource",
custom_attributes=["string"],
email_attribute="string",
entity_issuer="string",
ext_id="string",
groups_attribute="string",
groups_delim="string",
idp_metadata_url="string",
idp_metadata_xml="string",
idp_metadatas=[{
"certificate": "string",
"entity_id": "string",
"login_url": "string",
"error_url": "string",
"logout_url": "string",
"name_id_policy_format": "string",
}],
is_signed_authn_req_enabled=False,
name="string",
username_attribute="string")
const samlIdentityProvidersV2Resource = new nutanix.SamlIdentityProvidersV2("samlIdentityProvidersV2Resource", {
customAttributes: ["string"],
emailAttribute: "string",
entityIssuer: "string",
extId: "string",
groupsAttribute: "string",
groupsDelim: "string",
idpMetadataUrl: "string",
idpMetadataXml: "string",
idpMetadatas: [{
certificate: "string",
entityId: "string",
loginUrl: "string",
errorUrl: "string",
logoutUrl: "string",
nameIdPolicyFormat: "string",
}],
isSignedAuthnReqEnabled: false,
name: "string",
usernameAttribute: "string",
});
type: nutanix:SamlIdentityProvidersV2
properties:
customAttributes:
- string
emailAttribute: string
entityIssuer: string
extId: string
groupsAttribute: string
groupsDelim: string
idpMetadataUrl: string
idpMetadataXml: string
idpMetadatas:
- certificate: string
entityId: string
errorUrl: string
loginUrl: string
logoutUrl: string
nameIdPolicyFormat: string
isSignedAuthnReqEnabled: false
name: string
usernameAttribute: string
SamlIdentityProvidersV2 Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SamlIdentityProvidersV2 resource accepts the following input properties:
- Custom
Attributes List<string> - Email
Attribute string - Entity
Issuer string - It will be used as Issuer in SAML authnRequest.
- Ext
Id string - The External Identifier of the User Group.
- Groups
Attribute string - Groups
Delim string - Delimiter is used to split the value of attribute into multiple groups.
- Idp
Metadata stringUrl - Idp
Metadata stringXml - Idp
Metadatas List<PiersKarsenbarg. Nutanix. Inputs. Saml Identity Providers V2Idp Metadata> - Type of the User Group. LDAP (User Group belonging to a Directory Service (Open LDAP/AD)), SAML (User Group belonging to a SAML IDP.)
- Is
Signed boolAuthn Req Enabled - Flag indicating signing of SAML authnRequests.
- Name string
- Unique name of the IDP.
- Username
Attribute string
- Custom
Attributes []string - Email
Attribute string - Entity
Issuer string - It will be used as Issuer in SAML authnRequest.
- Ext
Id string - The External Identifier of the User Group.
- Groups
Attribute string - Groups
Delim string - Delimiter is used to split the value of attribute into multiple groups.
- Idp
Metadata stringUrl - Idp
Metadata stringXml - Idp
Metadatas []SamlIdentity Providers V2Idp Metadata Args - Type of the User Group. LDAP (User Group belonging to a Directory Service (Open LDAP/AD)), SAML (User Group belonging to a SAML IDP.)
- Is
Signed boolAuthn Req Enabled - Flag indicating signing of SAML authnRequests.
- Name string
- Unique name of the IDP.
- Username
Attribute string
- custom
Attributes List<String> - email
Attribute String - entity
Issuer String - It will be used as Issuer in SAML authnRequest.
- ext
Id String - The External Identifier of the User Group.
- groups
Attribute String - groups
Delim String - Delimiter is used to split the value of attribute into multiple groups.
- idp
Metadata StringUrl - idp
Metadata StringXml - idp
Metadatas List<SamlIdentity Providers V2Idp Metadata> - Type of the User Group. LDAP (User Group belonging to a Directory Service (Open LDAP/AD)), SAML (User Group belonging to a SAML IDP.)
- is
Signed BooleanAuthn Req Enabled - Flag indicating signing of SAML authnRequests.
- name String
- Unique name of the IDP.
- username
Attribute String
- custom
Attributes string[] - email
Attribute string - entity
Issuer string - It will be used as Issuer in SAML authnRequest.
- ext
Id string - The External Identifier of the User Group.
- groups
Attribute string - groups
Delim string - Delimiter is used to split the value of attribute into multiple groups.
- idp
Metadata stringUrl - idp
Metadata stringXml - idp
Metadatas SamlIdentity Providers V2Idp Metadata[] - Type of the User Group. LDAP (User Group belonging to a Directory Service (Open LDAP/AD)), SAML (User Group belonging to a SAML IDP.)
- is
Signed booleanAuthn Req Enabled - Flag indicating signing of SAML authnRequests.
- name string
- Unique name of the IDP.
- username
Attribute string
- custom_
attributes Sequence[str] - email_
attribute str - entity_
issuer str - It will be used as Issuer in SAML authnRequest.
- ext_
id str - The External Identifier of the User Group.
- groups_
attribute str - groups_
delim str - Delimiter is used to split the value of attribute into multiple groups.
- idp_
metadata_ strurl - idp_
metadata_ strxml - idp_
metadatas Sequence[SamlIdentity Providers V2Idp Metadata Args] - Type of the User Group. LDAP (User Group belonging to a Directory Service (Open LDAP/AD)), SAML (User Group belonging to a SAML IDP.)
- is_
signed_ boolauthn_ req_ enabled - Flag indicating signing of SAML authnRequests.
- name str
- Unique name of the IDP.
- username_
attribute str
- custom
Attributes List<String> - email
Attribute String - entity
Issuer String - It will be used as Issuer in SAML authnRequest.
- ext
Id String - The External Identifier of the User Group.
- groups
Attribute String - groups
Delim String - Delimiter is used to split the value of attribute into multiple groups.
- idp
Metadata StringUrl - idp
Metadata StringXml - idp
Metadatas List<Property Map> - Type of the User Group. LDAP (User Group belonging to a Directory Service (Open LDAP/AD)), SAML (User Group belonging to a SAML IDP.)
- is
Signed BooleanAuthn Req Enabled - Flag indicating signing of SAML authnRequests.
- name String
- Unique name of the IDP.
- username
Attribute String
Outputs
All input properties are implicitly available as output properties. Additionally, the SamlIdentityProvidersV2 resource produces the following output properties:
- Created
By string - User or Service who created the SAML Identity Provider.
- Created
Time string - Creation time of the SAML Identity Provider.
- Id string
- The provider-assigned unique ID for this managed resource.
- Last
Updated stringTime - Last updated time of the SAML Identity Provider.
- Created
By string - User or Service who created the SAML Identity Provider.
- Created
Time string - Creation time of the SAML Identity Provider.
- Id string
- The provider-assigned unique ID for this managed resource.
- Last
Updated stringTime - Last updated time of the SAML Identity Provider.
- created
By String - User or Service who created the SAML Identity Provider.
- created
Time String - Creation time of the SAML Identity Provider.
- id String
- The provider-assigned unique ID for this managed resource.
- last
Updated StringTime - Last updated time of the SAML Identity Provider.
- created
By string - User or Service who created the SAML Identity Provider.
- created
Time string - Creation time of the SAML Identity Provider.
- id string
- The provider-assigned unique ID for this managed resource.
- last
Updated stringTime - Last updated time of the SAML Identity Provider.
- created_
by str - User or Service who created the SAML Identity Provider.
- created_
time str - Creation time of the SAML Identity Provider.
- id str
- The provider-assigned unique ID for this managed resource.
- last_
updated_ strtime - Last updated time of the SAML Identity Provider.
- created
By String - User or Service who created the SAML Identity Provider.
- created
Time String - Creation time of the SAML Identity Provider.
- id String
- The provider-assigned unique ID for this managed resource.
- last
Updated StringTime - Last updated time of the SAML Identity Provider.
Look up Existing SamlIdentityProvidersV2 Resource
Get an existing SamlIdentityProvidersV2 resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SamlIdentityProvidersV2State, opts?: CustomResourceOptions): SamlIdentityProvidersV2@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
created_by: Optional[str] = None,
created_time: Optional[str] = None,
custom_attributes: Optional[Sequence[str]] = None,
email_attribute: Optional[str] = None,
entity_issuer: Optional[str] = None,
ext_id: Optional[str] = None,
groups_attribute: Optional[str] = None,
groups_delim: Optional[str] = None,
idp_metadata_url: Optional[str] = None,
idp_metadata_xml: Optional[str] = None,
idp_metadatas: Optional[Sequence[SamlIdentityProvidersV2IdpMetadataArgs]] = None,
is_signed_authn_req_enabled: Optional[bool] = None,
last_updated_time: Optional[str] = None,
name: Optional[str] = None,
username_attribute: Optional[str] = None) -> SamlIdentityProvidersV2func GetSamlIdentityProvidersV2(ctx *Context, name string, id IDInput, state *SamlIdentityProvidersV2State, opts ...ResourceOption) (*SamlIdentityProvidersV2, error)public static SamlIdentityProvidersV2 Get(string name, Input<string> id, SamlIdentityProvidersV2State? state, CustomResourceOptions? opts = null)public static SamlIdentityProvidersV2 get(String name, Output<String> id, SamlIdentityProvidersV2State state, CustomResourceOptions options)resources: _: type: nutanix:SamlIdentityProvidersV2 get: id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Created
By string - User or Service who created the SAML Identity Provider.
- Created
Time string - Creation time of the SAML Identity Provider.
- Custom
Attributes List<string> - Email
Attribute string - Entity
Issuer string - It will be used as Issuer in SAML authnRequest.
- Ext
Id string - The External Identifier of the User Group.
- Groups
Attribute string - Groups
Delim string - Delimiter is used to split the value of attribute into multiple groups.
- Idp
Metadata stringUrl - Idp
Metadata stringXml - Idp
Metadatas List<PiersKarsenbarg. Nutanix. Inputs. Saml Identity Providers V2Idp Metadata> - Type of the User Group. LDAP (User Group belonging to a Directory Service (Open LDAP/AD)), SAML (User Group belonging to a SAML IDP.)
- Is
Signed boolAuthn Req Enabled - Flag indicating signing of SAML authnRequests.
- Last
Updated stringTime - Last updated time of the SAML Identity Provider.
- Name string
- Unique name of the IDP.
- Username
Attribute string
- Created
By string - User or Service who created the SAML Identity Provider.
- Created
Time string - Creation time of the SAML Identity Provider.
- Custom
Attributes []string - Email
Attribute string - Entity
Issuer string - It will be used as Issuer in SAML authnRequest.
- Ext
Id string - The External Identifier of the User Group.
- Groups
Attribute string - Groups
Delim string - Delimiter is used to split the value of attribute into multiple groups.
- Idp
Metadata stringUrl - Idp
Metadata stringXml - Idp
Metadatas []SamlIdentity Providers V2Idp Metadata Args - Type of the User Group. LDAP (User Group belonging to a Directory Service (Open LDAP/AD)), SAML (User Group belonging to a SAML IDP.)
- Is
Signed boolAuthn Req Enabled - Flag indicating signing of SAML authnRequests.
- Last
Updated stringTime - Last updated time of the SAML Identity Provider.
- Name string
- Unique name of the IDP.
- Username
Attribute string
- created
By String - User or Service who created the SAML Identity Provider.
- created
Time String - Creation time of the SAML Identity Provider.
- custom
Attributes List<String> - email
Attribute String - entity
Issuer String - It will be used as Issuer in SAML authnRequest.
- ext
Id String - The External Identifier of the User Group.
- groups
Attribute String - groups
Delim String - Delimiter is used to split the value of attribute into multiple groups.
- idp
Metadata StringUrl - idp
Metadata StringXml - idp
Metadatas List<SamlIdentity Providers V2Idp Metadata> - Type of the User Group. LDAP (User Group belonging to a Directory Service (Open LDAP/AD)), SAML (User Group belonging to a SAML IDP.)
- is
Signed BooleanAuthn Req Enabled - Flag indicating signing of SAML authnRequests.
- last
Updated StringTime - Last updated time of the SAML Identity Provider.
- name String
- Unique name of the IDP.
- username
Attribute String
- created
By string - User or Service who created the SAML Identity Provider.
- created
Time string - Creation time of the SAML Identity Provider.
- custom
Attributes string[] - email
Attribute string - entity
Issuer string - It will be used as Issuer in SAML authnRequest.
- ext
Id string - The External Identifier of the User Group.
- groups
Attribute string - groups
Delim string - Delimiter is used to split the value of attribute into multiple groups.
- idp
Metadata stringUrl - idp
Metadata stringXml - idp
Metadatas SamlIdentity Providers V2Idp Metadata[] - Type of the User Group. LDAP (User Group belonging to a Directory Service (Open LDAP/AD)), SAML (User Group belonging to a SAML IDP.)
- is
Signed booleanAuthn Req Enabled - Flag indicating signing of SAML authnRequests.
- last
Updated stringTime - Last updated time of the SAML Identity Provider.
- name string
- Unique name of the IDP.
- username
Attribute string
- created_
by str - User or Service who created the SAML Identity Provider.
- created_
time str - Creation time of the SAML Identity Provider.
- custom_
attributes Sequence[str] - email_
attribute str - entity_
issuer str - It will be used as Issuer in SAML authnRequest.
- ext_
id str - The External Identifier of the User Group.
- groups_
attribute str - groups_
delim str - Delimiter is used to split the value of attribute into multiple groups.
- idp_
metadata_ strurl - idp_
metadata_ strxml - idp_
metadatas Sequence[SamlIdentity Providers V2Idp Metadata Args] - Type of the User Group. LDAP (User Group belonging to a Directory Service (Open LDAP/AD)), SAML (User Group belonging to a SAML IDP.)
- is_
signed_ boolauthn_ req_ enabled - Flag indicating signing of SAML authnRequests.
- last_
updated_ strtime - Last updated time of the SAML Identity Provider.
- name str
- Unique name of the IDP.
- username_
attribute str
- created
By String - User or Service who created the SAML Identity Provider.
- created
Time String - Creation time of the SAML Identity Provider.
- custom
Attributes List<String> - email
Attribute String - entity
Issuer String - It will be used as Issuer in SAML authnRequest.
- ext
Id String - The External Identifier of the User Group.
- groups
Attribute String - groups
Delim String - Delimiter is used to split the value of attribute into multiple groups.
- idp
Metadata StringUrl - idp
Metadata StringXml - idp
Metadatas List<Property Map> - Type of the User Group. LDAP (User Group belonging to a Directory Service (Open LDAP/AD)), SAML (User Group belonging to a SAML IDP.)
- is
Signed BooleanAuthn Req Enabled - Flag indicating signing of SAML authnRequests.
- last
Updated StringTime - Last updated time of the SAML Identity Provider.
- name String
- Unique name of the IDP.
- username
Attribute String
Supporting Types
SamlIdentityProvidersV2IdpMetadata, SamlIdentityProvidersV2IdpMetadataArgs
- Certificate string
- Certificate for verification.
- Entity
Id string - Entity Identifier of Identity provider.
- Login
Url string - Login URL of the Identity provider.
- Error
Url string - Error URL of the Identity provider.
- Logout
Url string - Logout URL of the Identity provider.
- Name
Id stringPolicy Format - Name ID Policy format.
- supported values:
emailAddress: - Uses email address as NameID format
- Certificate string
- Certificate for verification.
- Entity
Id string - Entity Identifier of Identity provider.
- Login
Url string - Login URL of the Identity provider.
- Error
Url string - Error URL of the Identity provider.
- Logout
Url string - Logout URL of the Identity provider.
- Name
Id stringPolicy Format - Name ID Policy format.
- supported values:
emailAddress: - Uses email address as NameID format
- certificate String
- Certificate for verification.
- entity
Id String - Entity Identifier of Identity provider.
- login
Url String - Login URL of the Identity provider.
- error
Url String - Error URL of the Identity provider.
- logout
Url String - Logout URL of the Identity provider.
- name
Id StringPolicy Format - Name ID Policy format.
- supported values:
emailAddress: - Uses email address as NameID format
- certificate string
- Certificate for verification.
- entity
Id string - Entity Identifier of Identity provider.
- login
Url string - Login URL of the Identity provider.
- error
Url string - Error URL of the Identity provider.
- logout
Url string - Logout URL of the Identity provider.
- name
Id stringPolicy Format - Name ID Policy format.
- supported values:
emailAddress: - Uses email address as NameID format
- certificate str
- Certificate for verification.
- entity_
id str - Entity Identifier of Identity provider.
- login_
url str - Login URL of the Identity provider.
- error_
url str - Error URL of the Identity provider.
- logout_
url str - Logout URL of the Identity provider.
- name_
id_ strpolicy_ format - Name ID Policy format.
- supported values:
emailAddress: - Uses email address as NameID format
- certificate String
- Certificate for verification.
- entity
Id String - Entity Identifier of Identity provider.
- login
Url String - Login URL of the Identity provider.
- error
Url String - Error URL of the Identity provider.
- logout
Url String - Logout URL of the Identity provider.
- name
Id StringPolicy Format - Name ID Policy format.
- supported values:
emailAddress: - Uses email address as NameID format
Package Details
- Repository
- nutanix pierskarsenbarg/pulumi-nutanix
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
nutanixTerraform Provider.
published on Tuesday, Apr 28, 2026 by Piers Karsenbarg
