This section guides you through using the Identity Application Management API to create a service provider, update it, delete it and the different operations you can use to work with it. See Calling Admin Services to enable the admin service. The following operations are available:
The service contract of this admin service can be found at https://<IS_HOST>:<IS_PORT>/services/IdentityApplicationManagementService?wsdl. Replace the tag <IS_HOST>:<IS_PORT> with the relevant host and port number, for example: https://localhost:9443/services/IdentityApplicationManagementService?wsdl
createApplication
Permission Level: /permission/admin/manage
Creating an application via Identity Application Management Service is a two-step process. The first step involves creating a service provider for the given application name and the description. The next step is to update it with other configurations. The createApplication
operation performs the first step i.e, it creates a service provider in the Identity Server for the application name and description, and returns 200 OK (indicates the request has succeeded). Additionally, you can mention the application id in the same request. If you haven't mentioned the application id, you need to call getApplication
service method with the application name to get the application id which you need for updateApplication
operation.
Input parameters
Parameter | Type | Description |
---|---|---|
applicationID | Integer | Unique application id for the service provider. This is an optional parameter, if you have not specified this value, Identity Server will assign a unique application id. |
applicationName | String | The desired service provider name. Adding a service provider creates an internal application role for the given name as Internal/<applicationName>. Thus, creating another service provider for the name is not possible and will throw an IdentityApplicationManagementException. |
description | String | Some text describing the service provider |
The format of the create request should be as follows.
Request:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsd="http://org.apache.axis2/xsd" xmlns:xsd1="http://model.common.application.identity.carbon.wso2.org/xsd"> <soapenv:Header/> <soapenv:Body> <xsd:createApplication> <!--Optional:--> <xsd:serviceProvider> <!--Optional:--> <xsd1:applicationName>?</xsd1:applicationName> <!--Optional:--> <xsd1:description>?</xsd1:description> </xsd:serviceProvider> </xsd:createApplication> </soapenv:Body> </soapenv:Envelope>
Request with Application Id:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsd="http://org.apache.axis2/xsd" xmlns:xsd1="http://model.common.application.identity.carbon.wso2.org/xsd"> <soapenv:Header/> <soapenv:Body> <xsd:createApplication> <!--Optional:--> <xsd:serviceProvider> <!--Optional:--> <xsd1:applicationID>?</xsd1:applicationID> <!--Optional:--> <xsd1:applicationName>?</xsd1:applicationName> <!--Optional:--> <xsd1:description>?</xsd1:description> </xsd:serviceProvider> </xsd:createApplication> </soapenv:Body> </soapenv:Envelope>
Response:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Body> <ns:createApplicationResponse xmlns:ns="http://org.apache.axis2/xsd"> <ns:return xsi:nil="true" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"/> </ns:createApplicationResponse> </soapenv:Body> </soapenv:Envelope>
updateApplication
Permission Level: /permission/admin/manage
After creating the service provider, it can be configured and updated with the following configurations:
- Claim configuration
- Role/Permission configuration
- Inbound and Outbound authentication configuration
- Inbound and Outbound provisioning configuration
The service provider is updated based on its application id. So you need to retrieve it from the identity server if you haven't provided an application id while creating the service provider. You can use getApplication service method to get the application id value.
The format of the update request should be as follows.
Request:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsd="http://org.apache.axis2/xsd" xmlns:xsd1="http://model.common.application.identity.carbon.wso2.org/xsd"> <soapenv:Header/> <soapenv:Body> <xsd:updateApplication> <!--Optional:--> <xsd:serviceProvider> <!--Optional:--> <xsd1:applicationID>?</xsd1:applicationID> <!--Optional:--> <xsd1:applicationName>?</xsd1:applicationName> <!--Optional:--> <xsd1:claimConfig> </xsd1:claimConfig> <!--Optional:--> <xsd1:description>?</xsd1:description> <!--Optional:--> <xsd1:inboundAuthenticationConfig>...</xsd1:inboundAuthenticationConfig> <!--Optional:--> <xsd1:inboundProvisioningConfig>...</xsd1:inboundProvisioningConfig> <!--Optional:--> <xsd1:localAndOutBoundAuthenticationConfig>...</xsd1:localAndOutBoundAuthenticationConfig> <!--Optional:--> <xsd1:outboundProvisioningConfig>...</xsd1:outboundProvisioningConfig> <!--Optional:--> <xsd1:owner>...</xsd1:owner> <!--Optional:--> <xsd1:permissionAndRoleConfig>...</xsd1:permissionAndRoleConfig> <!--Zero or more repetitions:--> <xsd1:requestPathAuthenticatorConfigs>...</xsd1:requestPathAuthenticatorConfigs> <!--Optional:--> <xsd1:saasApp>?</xsd1:saasApp> </xsd:serviceProvider> </xsd:updateApplication> </soapenv:Body> </soapenv:Envelope>
Response:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Body> <ns:updateApplicationResponse xmlns:ns="http://org.apache.axis2/xsd"> <ns:return xsi:nil="true" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"/> </ns:updateApplicationResponse> </soapenv:Body> </soapenv:Envelope>
Input parameters
Service provider level parameters
Parameter | Type | Description |
---|---|---|
applicationID | Integer | Application ID of the service provider. This is mandatory when updating the SP |
applicationName | String | Service provider name |
claimConfig | ClaimConfig | Claims related configurations |
description | String | Description of the SP |
inboundAuthenticationConfig | InboundAuthenticationConfig | Inbound authentication related configurations |
inboundProvisioningConfig | InboundProvisioningConfig | Inbound provisioning related configurations |
localAndOutBoundAuthenticationConfig | LocalAndOutboundAuthenticationConfig | Local and outbound authentication configurations |
outboundProvisioningConfig | OutboundProvisioningConfig | Outbound provisioning related configurations |
owner | User | Applicationn owner |
permissionAndRoleConfig | PermissionsAndRoleConfig | Permission and role related configurations |
requestPathAuthenticatorConfigs | RequestPathAuthenticatorConfig | Request patch authenticator related configurations |
saasApp | Optional | This parameter allows you to determine whether the service provider is a SaaS application. true - enable SaaS application false - disable SaaS application If no value is passed for this parameter, the service provider is marked as SaaS disabled by default. Thus, the web application is not shared among tenants so only users in the current tenant (the one you are logged in when creating the service provider) are allowed to log into the web application. Alternatively, if you enabled SaaS application, it means that this web application is shared among tenants so users from any tenant are allowed to log into the web application. |
Claim configuration level parameters
The <claimConfig> element defines all claim configuration level inputs. This element can have zero or more <claimMappings>
elements that specify claims referred by this service provider. A <claimMappings>
element includes two elements; <localClaim>
and <remoteClaim>
where each is represented by a claimId and a claimURI. The <localClaim>
denotes a standard claim which is local to the WSO2 Identity Server and the <remoteClaim>
denotes some remote claim value that maps to the local claim under the same claim mapping. Remote claims are specifically used with identity federation scenarios to map claims received from the federated Identity Provider to local claims.
Parameter | Type | Description |
---|---|---|
alwaysSendMappedLocalSubjectId | Boolean | This configuration specifies whether subject attribute which returns to the service provider is taken from the locally mapped user or from the federated user. |
localClaimDialect | Boolean | This is a boolean that specifies whether this service provider is using the local claim dialect or a custom claim dialect. true - using the local claim dialect false - using the custom claim dialect If it is using the custom claim dialect, the local claim should map with a remote claim in each claim mapping otherwise, both the local claim URI and the remote claim URI should be the same (i.e. a URI defined under a dialect local to the WSO2 Identity Server). |
claimMappings.localClaim.claimId claimMappings.remoteClaim.claimId | Integer | Integer value that identifies the claim. Applies to both localClaim and remoteClaim elements. |
claimMappings.localClaim.claimUri claimMappings.remoteClaim.claimUri | String | URI specific to the claim. Applies to both localClaim and remoteClaim elements. When defined under localClaim, this is a URI defined under the dialect specific to the claim. If defined under the remoteClaim, this is a remote claim URI which maps with the local claim defined under the same parent claimMappings element. If only the local claim dialect is used, the same claimURI in localClaim should be used with claimURI in remoteClaim, since there are no explicit local to remote claim mappings. |
claimMappings.requested | Boolean | This is a boolean that marks a mapped claim as a requested claim which ensures that the service provider definitely sends this claim to the Identity Server. true - mark as requested false - mark as not requested |
roleClaimURI | String | Role claim URI is used to identify the claim that equates to the role of the user. This is linked to the permissions that you can apply for specific user roles. This is a remote claim URI mapped via claim mappings. |
userClaimURI | String | User claim URI is also referred to as Subject claim URI in the management console. It is the claim that is used to uniquely identiy a user. For example, mapping the claims to the users email or ID attribute. |
claimConfig Request Element:
<xsd1:claimConfig> <!--Optional:--> <xsd1:alwaysSendMappedLocalSubjectId>?</xsd1:alwaysSendMappedLocalSubjectId> <!--Zero or more repetitions:--> <xsd1:claimMappings> <!--Optional:--> <xsd1:defaultValue>?</xsd1:defaultValue> <!--Optional:--> <xsd1:localClaim> <!--Optional:--> <xsd1:claimId>?</xsd1:claimId> <!--Optional:--> <xsd1:claimUri>?</xsd1:claimUri> </xsd1:localClaim> <!--Optional:--> <xsd1:mandatory>?</xsd1:mandatory> <!--Optional:--> <xsd1:remoteClaim> <!--Optional:--> <xsd1:claimId>?</xsd1:claimId> <!--Optional:--> <xsd1:claimUri>?</xsd1:claimUri> </xsd1:remoteClaim> <!--Optional:--> <xsd1:requested>?</xsd1:requested> </xsd1:claimMappings> <!--Zero or more repetitions:--> <xsd1:idpClaims> <!--Optional:--> <xsd1:claimId>?</xsd1:claimId> <!--Optional:--> <xsd1:claimUri>?</xsd1:claimUri> </xsd1:idpClaims> <!--Optional:--> <xsd1:localClaimDialect>?</xsd1:localClaimDialect> <!--Optional:--> <xsd1:roleClaimURI>?</xsd1:roleClaimURI> <!--Optional:--> <xsd1:userClaimURI>?</xsd1:userClaimURI> </xsd1:claimConfig>
Permissions and roles configuration parameters
The
<permissionAndRoleConfig>
element defines all permission and role configuration level inputs. Under this element, specific permissions can be specified via zero or more <permissions>
blocks.
Parameter | Type | Description |
---|---|---|
permissions.value | String | A string value that defines a service provider specific permission. This permission is added under |
Once the permissions are specified, the roles specific to the service provider can be mapped to local roles defined in the Identity Server via zero or more <roleMappings>
blocks. A <roleMappings>
block includes a <localRole>
element and a <remoteRole>
element. The <localRole>
represents a local role defined in the identity server and the <remoteRole>
represents the service provider specific role that you want to map to the local role.
Parameter | Type | Description |
---|---|---|
localRole.localRoleName | String | This is the name of the local role which is defined in Identity Server. |
localRole.userStoreId | String | This is the key of the userstore used by Identity Server. |
remoteRole | String | Role specific to the service provider |
<xsd1:permissionAndRoleConfig> <!--Zero or more repetitions:--> <xsd1:idpRoles>?</xsd1:idpRoles> <!--Zero or more repetitions:--> <xsd1:permissions> <!--Optional:--> <xsd1:value>?</xsd1:value> </xsd1:permissions> <!--Zero or more repetitions:--> <xsd1:roleMappings> <!--Optional:--> <xsd1:localRole> <!--Optional:--> <xsd1:localRoleName>?</xsd1:localRoleName> <!--Optional:--> <xsd1:userStoreId>?</xsd1:userStoreId> </xsd1:localRole> <!--Optional:--> <xsd1:remoteRole>?</xsd1:remoteRole> </xsd1:roleMappings> </xsd1:permissionAndRoleConfig>
Inbound authentication
Inbound Authentication Configuration defines the protocol that the service provider and the Identity Server use to communicate with each other. You can add a common set of configurations for the service provider for any protocol supported by WSO2 Identity Server such as SAML 2.0, OpenID, OpenID Connect, OAuth 2.0, and WS-Federation (passive).
The <inboundAuthenticationConfig>
element consists zero or more <inboundAuthenticationRequestConfigs> elements. The <inboundAuthenticationRequestConfigs> element has following elements. (Note: Only the required element are mentioned).
IMPORTANT: You need to create inbound authenticator configurations accessing the appropriate services(Ex: OAuthAdminService, IdentitySAMLSSOConfigService, etc.), before updating service provider with inbound authenticator configurations.
Parameter | Type | Description |
---|---|---|
inboundAuthKey | String | Specify an identifier for the service provider as the authentication key. |
inboundAuthType | String | Specify the authentication type. ex: samlsso, oauth2, wstrust, passivests, |
properties | Property | Inbound authentication request properties |
properties.name | String | Specify the property name |
properties.value | String | Specify the property value |
<xsd1:inboundAuthenticationConfig> <!--Zero or more repetitions:--> <xsd1:inboundAuthenticationRequestConfigs> <!--Optional:--> <xsd1:friendlyName>?</xsd1:friendlyName> <!--Optional:--> <xsd1:inboundAuthKey>?</xsd1:inboundAuthKey> <!--Optional:--> <xsd1:inboundAuthType>?</xsd1:inboundAuthType> <!--Optional:--> <xsd1:inboundConfigType>?</xsd1:inboundConfigType> <!--Zero or more repetitions:--> <xsd1:properties> <!--Optional:--> <xsd1:advanced>?</xsd1:advanced> <!--Optional:--> <xsd1:confidential>?</xsd1:confidential> <!--Optional:--> <xsd1:defaultValue>?</xsd1:defaultValue> <!--Optional:--> <xsd1:description>?</xsd1:description> <!--Optional:--> <xsd1:displayName>?</xsd1:displayName> <!--Optional:--> <xsd1:displayOrder>?</xsd1:displayOrder> <!--Optional:--> <xsd1:name>?</xsd1:name> <!--Optional:--> <xsd1:required>?</xsd1:required> <!--Optional:--> <xsd1:type>?</xsd1:type> <!--Optional:--> <xsd1:value>?</xsd1:value> </xsd1:properties> </xsd1:inboundAuthenticationRequestConfigs> </xsd1:inboundAuthenticationConfig>
Inbound provisioning configuration
The inbound provisioning of the service provider can be configured.
Parameter | Type | Description |
---|---|---|
provisioningEnabled | Boolean | Specify whether inbound provisioning is enabled |
provisioningUserStore | String | User store domain name |
<xsd1:inboundProvisioningConfig> <!--Optional:--> <xsd1:dumbMode>?</xsd1:dumbMode> <!--Optional:--> <xsd1:provisioningEnabled>?</xsd1:provisioningEnabled> <!--Optional:--> <xsd1:provisioningUserStore>?</xsd1:provisioningUserStore> </xsd1:inboundProvisioningConfig>
Local and outbound authentication configuration
Parameter | Type | Description |
---|---|---|
alwaysSendBackAuthenticatedListOfIdPs | boolean | Always send back the authenticated list of identity providers. true - send authenticated list of IdPs false - do not send authenticated list of IdPs |
authenticationStepForAttributes | AuthenticationStep | No Usage found |
authenticationStepForSubject | AuthenticationStep | No Usage found |
authenticationSteps | AuthenticationStep | Zero or more authentication steps |
authenticationSteps.attributeStep | boolean | true - Use attributes from the current step |
authenticationSteps.federatedIdentityProviders | IdentityProvider | To configure federated IdPs, there should be one or more registered IdPs with at least one federated authenticator enabled. With the request, it is necessary to include the IdP name and the federated authenticator name. The federated authenticator should be enabled in the IdP. If a federated authenticator is not mentioned, the default federated authenticator for the IdP will be used. |
authenticationSteps.localAuthenticatorConfigs | LocalAuthenticatorConfigs | Local authentication related configs for the authentication step. For example, you can specify whether to use a basic or an IWA authenticator. To use basic, localAuthenticatorConfigs.name should be 'BasicAuthenticator' while 'IWAAuthenticator' for iwa. |
authenticationSteps.stepOrder | int | Execution order of the step. |
authenticationSteps.subjectStep | boolean | true - Use subject identifier from this step |
authenticationType | String | Depending on the requirement, the authentication type can be specified. The available types are: default, local, federated, flow. Refer the sample requests below on each authentication type configuration. |
subjectClaimUri | String | Subject claim URI |
Default
<xsd1:localAndOutBoundAuthenticationConfig> <!--Optional:--> <xsd1:alwaysSendBackAuthenticatedListOfIdPs>false</xsd1:alwaysSendBackAuthenticatedListOfIdPs> <!--Optional:--> <xsd1:authenticationType>default</xsd1:authenticationType> <!--Optional:--> <xsd1:subjectClaimUri>http://wso2.org/claims/fullname</xsd1:subjectClaimUri> </xsd1:localAndOutBoundAuthenticationConfig>
Local
Since there is only one <authenticationSteps>
element configured here, there is no need to set the authenticationSteps.stepOrder
, authenticationSteps.subjectStep, authenticationSteps.attributeStep
attributes.
<xsd1:localAndOutBoundAuthenticationConfig> <!--Zero or more repetitions:--> <xsd1:authenticationSteps> <!--Zero or more repetitions:--> <xsd1:localAuthenticatorConfigs> <!--Optional:--> <xsd1:displayName>basic</xsd1:displayName> <!--Optional:--> <xsd1:name>BasicAuthenticator</xsd1:name> <!--Optional:--> <xsd1:valid>true</xsd1:valid> <!--Zero or more repetitions:--> </xsd1:localAuthenticatorConfigs> <!--Optional:--> <xsd1:stepOrder>1</xsd1:stepOrder> <!--Optional:--> <xsd1:subjectStep>false</xsd1:subjectStep> <!--Optional:--> </xsd1:authenticationSteps> <xsd1:authenticationType>local</xsd1:authenticationType> <!--Optional:--> <xsd1:subjectClaimUri>http://wso2.org/claims/fullname</xsd1:subjectClaimUri> </xsd1:localAndOutBoundAuthenticationConfig>
Federated
Since there is only one <authenticationSteps>
configured here, there is no need to set the authenticationSteps.stepOrder, authenticationSteps.subjectStep, authenticationSteps.attributeStep
attributes.
<xsd1:localAndOutBoundAuthenticationConfig> <!--Zero or more repetitions:--> <xsd1:authenticationSteps> <!--Zero or more repetitions:--> <xsd1:federatedIdentityProviders> <!--Zero or more repetitions:--> <xsd1:federatedAuthenticatorConfigs> <!--Optional:--> <xsd1:displayName>samlsso</xsd1:displayName> <!--Optional:--> <xsd1:name>SAMLSSOAuthenticator</xsd1:name> <!--Optional:--> <xsd1:valid>true</xsd1:valid> </xsd1:federatedAuthenticatorConfigs> <!--Optional:--> <xsd1:identityProviderName>TrustedIdP</xsd1:identityProviderName> </xsd1:federatedIdentityProviders> <!--Optional:--> <xsd1:stepOrder>1</xsd1:stepOrder> <!--Optional:--> <xsd1:subjectStep>false</xsd1:subjectStep> <!--Optional:--> </xsd1:authenticationSteps> <xsd1:authenticationType>federated</xsd1:authenticationType> <!--Optional:--> <xsd1:subjectClaimUri>http://wso2.org/claims/fullname</xsd1:subjectClaimUri> </xsd1:localAndOutBoundAuthenticationConfig>
<
authenticationSteps>
can be configured here. Therefore, in each <authenticationSteps>
, the stepOrder and whether the subject identifiers and attributes should be used from that particular step.<xsd1:localAndOutBoundAuthenticationConfig> <!--Zero or more repetitions:--> <xsd1:authenticationSteps> <!--Zero or more repetitions:--> <xsd1:federatedIdentityProviders> <!--Zero or more repetitions:--> <xsd1:federatedAuthenticatorConfigs> <!--Optional:--> <xsd1:displayName>samlsso</xsd1:displayName> <!--Optional:--> <xsd1:name>SAMLSSOAuthenticator</xsd1:name> <!--Optional:--> <xsd1:valid>true</xsd1:valid> </xsd1:federatedAuthenticatorConfigs> <!--Optional:--> <xsd1:identityProviderName>TrustedIdP</xsd1:identityProviderName> </xsd1:federatedIdentityProviders> <!--Zero or more repetitions:--> <xsd1:localAuthenticatorConfigs> <!--Optional:--> <xsd1:displayName>basic</xsd1:displayName> <!--Optional:--> <xsd1:name>BasicAuthenticator</xsd1:name> <!--Optional:--> <xsd1:valid>true</xsd1:valid> <!--Zero or more repetitions:--> </xsd1:localAuthenticatorConfigs> <!--Optional:--> <xsd1:stepOrder>1</xsd1:stepOrder> <!--Optional:--> <xsd1:subjectStep>false</xsd1:subjectStep> <!--Optional:--> </xsd1:authenticationSteps> <xsd1:authenticationType>flow</xsd1:authenticationType> <!--Optional:--> <xsd1:subjectClaimUri>http://wso2.org/cla
Request path authenticator configuration
Specify configurations related to zero or more request path authenticators.
Parameter | Type | Description |
---|---|---|
displayName | String | No Usage found |
enabled | Boolean | true - enable false - deisable |
name | String | OAuthRequestPathAuthenticator BasicAuthRequestPathAuthenticator |
valid | boolean | true - valid false - invalid |
properties | Property | No Usage found |
<xsd1:requestPathAuthenticatorConfigs> <!--Optional:--> <xsd1:name>BasicAuthRequestPathAuthenticator</xsd1:name> <!--Optional:--> <xsd1:valid>true</xsd1:valid> </xsd1:requestPathAuthenticatorConfigs> <xsd1:requestPathAuthenticatorConfigs> <!--Optional:--> <xsd1:name>OAuthRequestPathAuthenticator</xsd1:name> <!--Optional:--> <xsd1:valid>true</xsd1:valid> </xsd1:requestPathAuthenticatorConfigs>
Outbound provisioning configuration
To configure the outbound provisioning of the service provider, use the following parameters.
Parameter | Type | Description |
---|---|---|
provisionByRoleList | String | - |
provisioningIdentityProviders | IdentityProvider | To configure provisioning IdPs, there should be one or more registered IdPs, with at least one outbound provisioning connector enabled. Include the IdP name and provisioning connector name and specify whether to enable JiT provisioning with the request. |
outboundProvisioningConfig Request Element:
<xsd1:outboundProvisioningConfig> <!--Zero or more repetitions:--> <xsd1:provisionByRoleList></xsd1:provisionByRoleList> <!--Zero or more repetitions:--> <xsd1:provisioningIdentityProviders> <!--Optional:--> <xsd1:defaultProvisioningConnectorConfig> <!--Optional:--> <xsd1:blocking>false</xsd1:blocking> <!--Optional:--> <xsd1:enabled>false</xsd1:enabled> <!--Optional:--> <xsd1:name>scim</xsd1:name> <!--Optional:--> </xsd1:defaultProvisioningConnectorConfig> <!--Optional:--> <xsd1:identityProviderName>TrustedIdP</xsd1:identityProviderName> <!--Optional:--> <xsd1:justInTimeProvisioningConfig> <!--Optional:--> <xsd1:dumbMode>false</xsd1:dumbMode> <!--Optional:--> <xsd1:provisioningEnabled>true</xsd1:provisioningEnabled> </xsd1:justInTimeProvisioningConfig> </xsd1:provisioningIdentityProviders> </xsd1:outboundProvisioningConfig>
deleteApplication
Permission Level: /permission/admin/manage
A service provider is deleted based on the application name. The input parameters and the format of the request should be as follows.
Input parameters
Parameter | Type | Description |
---|---|---|
applicationName | String | Name of the application |
Request:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsd="http://org.apache.axis2/xsd"> <soapenv:Header/> <soapenv:Body> <xsd:deleteApplication> <!--Optional:--> <xsd:applicationName>TestSP</xsd:applicationName> </xsd:deleteApplication> </soapenv:Body> </soapenv:Envelope>
Response:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Body> <ns:deleteApplicationResponse xmlns:ns="http://org.apache.axis2/xsd"> <ns:return xsi:nil="true" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"/> </ns:deleteApplicationResponse> </soapenv:Body> </soapenv:Envelope>
getAllApplicationBasicInfo
Permission Level: /permission/admin/manage
This method can use to get all available service provider names and their descriptions.
Request:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsd="http://org.apache.axis2/xsd"> <soapenv:Header/> <soapenv:Body> <xsd:getAllApplicationBasicInfo/> </soapenv:Body> </soapenv:Envelope>
Response:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Body> <ns:getAllApplicationBasicInfoResponse xmlns:ns="http://org.apache.axis2/xsd" xmlns:ax2115="http://core.carbon.wso2.org/xsd" xmlns:ax2114="http://mgt.application.identity.carbon.wso2.org/xsd" xmlns:ax2120="http://common.application.identity.carbon.wso2.org/xsd" xmlns:ax2117="http://model.common.application.identity.carbon.wso2.org/xsd"> <ns:return xsi:type="ax2117:ApplicationBasicInfo" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> <ax2117:applicationName>TestSP1</ax2117:applicationName> <ax2117:description>Test Service Provider-1</ax2117:description> </ns:return> </ns:getAllApplicationBasicInfoResponse> </soapenv:Body> </soapenv:Envelope>
getAllIdentityProviders
Permission Level: /permission/admin/manage
This method can use to get all available identity providers.
Request:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsd="http://org.apache.axis2/xsd"> <soapenv:Header/> <soapenv:Body> <xsd:getAllIdentityProviders/> </soapenv:Body> </soapenv:Envelope>
Response:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Body> <ns:getAllIdentityProvidersResponse xmlns:ns="http://org.apache.axis2/xsd" xmlns:ax2115="http://core.carbon.wso2.org/xsd" xmlns:ax2114="http://mgt.application.identity.carbon.wso2.org/xsd" xmlns:ax2120="http://common.application.identity.carbon.wso2.org/xsd" xmlns:ax2117="http://model.common.application.identity.carbon.wso2.org/xsd"> <ns:return xsi:type="ax2117:IdentityProvider" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> <ax2117:alias xsi:nil="true"/> <ax2117:certificate xsi:nil="true"/> <ax2117:claimConfig xsi:nil="true"/> <ax2117:defaultAuthenticatorConfig xsi:nil="true"/> <ax2117:defaultProvisioningConnectorConfig xsi:nil="true"/> <ax2117:displayName xsi:nil="true"/> <ax2117:enable>true</ax2117:enable> <ax2117:federatedAuthenticatorConfigs xsi:type="ax2117:FederatedAuthenticatorConfig"> ...</ax2117:federatedAuthenticatorConfigs> <ax2117:federationHub>false</ax2117:federationHub> <ax2117:homeRealmId xsi:nil="true"/> <ax2117:identityProviderDescription xsi:nil="true"/> <ax2117:identityProviderName>TestIdP</ax2117:identityProviderName> <ax2117:justInTimeProvisioningConfig xsi:nil="true"/> <ax2117:permissionAndRoleConfig xsi:nil="true"/> <ax2117:primary>false</ax2117:primary> <ax2117:provisioningConnectorConfigs xsi:type="ax2117:ProvisioningConnectorConfig">... </ax2117:provisioningConnectorConfigs> <ax2117:provisioningRole xsi:nil="true"/> </ns:return> </ns:getAllIdentityProvidersResponse> </soapenv:Body> </soapenv:Envelope>
getAllLocalAuthenticators
Permission Level: /permission/admin/manage
This method can use to get all available local authenticators.
Request:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsd="http://org.apache.axis2/xsd"> <soapenv:Header/> <soapenv:Body> <xsd:getAllLocalAuthenticators/> </soapenv:Body> </soapenv:Envelope>
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Body> <ns:getAllLocalAuthenticatorsResponse xmlns:ns="http://org.apache.axis2/xsd" xmlns:ax2115="http://core.carbon.wso2.org/xsd" xmlns:ax2114="http://mgt.application.identity.carbon.wso2.org/xsd" xmlns:ax2120="http://common.application.identity.carbon.wso2.org/xsd" xmlns:ax2117="http://model.common.application.identity.carbon.wso2.org/xsd"> <ns:return xsi:type="ax2117:LocalAuthenticatorConfig" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> <ax2117:displayName>basic</ax2117:displayName> <ax2117:enabled>false</ax2117:enabled> <ax2117:name>BasicAuthenticator</ax2117:name> <ax2117:valid>true</ax2117:valid> </ns:return> <ns:return xsi:type="ax2117:LocalAuthenticatorConfig" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> <ax2117:displayName>iwa</ax2117:displayName> <ax2117:enabled>false</ax2117:enabled> <ax2117:name>IWAAuthenticator</ax2117:name> <ax2117:valid>true</ax2117:valid> </ns:return> </ns:getAllLocalAuthenticatorsResponse> </soapenv:Body> </soapenv:Envelope>
getAllLocalClaimUris
Permission Level: /permission/admin/manage
This method can use to get all available claim URI values which are in http://wso2.org/claims
dialect.
Request:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsd="http://org.apache.axis2/xsd"> <soapenv:Header/> <soapenv:Body> <xsd:getAllLocalClaimUris/> </soapenv:Body> </soapenv:Envelope>
Response:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Body> <ns:getAllLocalClaimUrisResponse xmlns:ns="http://org.apache.axis2/xsd" xmlns:ax2115="http://core.carbon.wso2.org/xsd" xmlns:ax2114="http://mgt.application.identity.carbon.wso2.org/xsd" xmlns:ax2120="http://common.application.identity.carbon.wso2.org/xsd" xmlns:ax2117="http://model.common.application.identity.carbon.wso2.org/xsd"> <ns:return>http://wso2.org/claims/otherphone</ns:return> <ns:return>http://wso2.org/claims/dob</ns:return> <ns:return>http://wso2.org/claims/primaryChallengeQuestion</ns:return> <ns:return>http://wso2.org/claims/role</ns:return> <ns:return>http://wso2.org/claims/challengeQuestion1</ns:return> <ns:return>http://wso2.org/claims/telephone</ns:return> <ns:return>http://wso2.org/claims/mobile</ns:return> <ns:return>http://wso2.org/claims/country</ns:return> <ns:return>http://wso2.org/claims/challengeQuestionUris</ns:return> <ns:return>http://wso2.org/claims/postalcode</ns:return> <ns:return>http://wso2.org/claims/challengeQuestion2</ns:return> <ns:return>http://wso2.org/claims/identity/accountLocked</ns:return> <ns:return>http://wso2.org/claims/nickname</ns:return> <ns:return>http://wso2.org/claims/streetaddress</ns:return> <ns:return>http://wso2.org/claims/url</ns:return> <ns:return>http://wso2.org/claims/givenname</ns:return> <ns:return>http://wso2.org/claims/emailaddress</ns:return> <ns:return>http://wso2.org/claims/oneTimePassword</ns:return> <ns:return>http://wso2.org/claims/region</ns:return> <ns:return>http://wso2.org/claims/gender</ns:return> <ns:return>http://wso2.org/claims/fullname</ns:return> <ns:return>http://wso2.org/claims/passwordTimestamp</ns:return> <ns:return>http://wso2.org/claims/title</ns:return> <ns:return>http://wso2.org/claims/locality</ns:return> <ns:return>http://wso2.org/claims/stateorprovince</ns:return> <ns:return>http://wso2.org/claims/im</ns:return> <ns:return>http://wso2.org/claims/organization</ns:return> <ns:return>http://wso2.org/claims/lastname</ns:return> </ns:getAllLocalClaimUrisResponse> </soapenv:Body> </soapenv:Envelope>
getAllRequestPathAuthenticators
Permission Level: /permission/admin/manage
This method can use to get all available request patch authenticators.
Request:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsd="http://org.apache.axis2/xsd"> <soapenv:Header/> <soapenv:Body> <xsd:getAllRequestPathAuthenticators/> </soapenv:Body> </soapenv:Envelope>
Response:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Body> <ns:getAllRequestPathAuthenticatorsResponse xmlns:ns="http://org.apache.axis2/xsd" xmlns:ax2115="http://core.carbon.wso2.org/xsd" xmlns:ax2114="http://mgt.application.identity.carbon.wso2.org/xsd" xmlns:ax2120="http://common.application.identity.carbon.wso2.org/xsd" xmlns:ax2117="http://model.common.application.identity.carbon.wso2.org/xsd"> <ns:return xsi:type="ax2117:RequestPathAuthenticatorConfig" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> <ax2117:displayName>basic-auth</ax2117:displayName> <ax2117:enabled>false</ax2117:enabled> <ax2117:name>BasicAuthRequestPathAuthenticator</ax2117:name> <ax2117:valid>true</ax2117:valid> </ns:return> <ns:return xsi:type="ax2117:RequestPathAuthenticatorConfig" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> <ax2117:displayName>oauth-bearer</ax2117:displayName> <ax2117:enabled>false</ax2117:enabled> <ax2117:name>OAuthRequestPathAuthenticator</ax2117:name> <ax2117:valid>true</ax2117:valid> </ns:return> </ns:getAllRequestPathAuthenticatorsResponse> </soapenv:Body> </soapenv:Envelope>
getApplication
Permission Level: /permission/admin/manage
This method can be use to get the service provider information while passing the application name. The input parameters and the format of the request should be as follows.
Input parameters
Parameter | Type | Description |
---|---|---|
applicationName | String | Name of the application |
Request:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsd="http://org.apache.axis2/xsd"> <soapenv:Header/> <soapenv:Body> <xsd:getApplication> <!--Optional:--> <xsd:applicationName>TestSP</xsd:applicationName> </xsd:getApplication> </soapenv:Body> </soapenv:Envelope>
Response:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Body> <ns:getApplicationResponse xmlns:ns="http://org.apache.axis2/xsd"> <ns:return xsi:type="ax2117:ServiceProvider" xmlns:ax2115="http://core.carbon.wso2.org/xsd" xmlns:ax2114="http://mgt.application.identity.carbon.wso2.org/xsd" xmlns:ax2120="http://common.application.identity.carbon.wso2.org/xsd" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ax2117="http://model.common.application.identity.carbon.wso2.org/xsd"> <ax2117:applicationID>4</ax2117:applicationID> <ax2117:applicationName>TestSP</ax2117:applicationName> <ax2117:claimConfig xsi:type="ax2117:ClaimConfig">... </ax2117:claimConfig> <ax2117:description>Description</ax2117:description> <ax2117:inboundAuthenticationConfig xsi:type="ax2117:InboundAuthenticationConfig"> ... </ax2117:inboundAuthenticationConfig> <ax2117:localAndOutBoundAuthenticationConfig xsi:type="ax2117:LocalAndOutboundAuthenticationConfig"> ...</ax2117:localAndOutBoundAuthenticationConfig> <ax2117:outboundProvisioningConfig xsi:type="ax2117:OutboundProvisioningConfig"> .. </ax2117:outboundProvisioningConfig> <ax2117:owner xsi:type="ax2117:User"> ... </ax2117:owner> <ax2117:permissionAndRoleConfig xsi:type="ax2117:PermissionsAndRoleConfig"/> <ax2117:saasApp>true</ax2117:saasApp> </ns:return> </ns:getApplicationResponse> </soapenv:Body> </soapenv:Envelope>
getIdentityProvider
Permission Level: /permission/admin/manage
This method can be used to get the identity provider information while passing the identity provider name. The input parameters and the format of the request should be as follows.
Input parameters
Parameter | Type | Description |
---|---|---|
federatedIdPName | String | Name of the identity provider |
Request:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsd="http://org.apache.axis2/xsd"> <soapenv:Header/> <soapenv:Body> <xsd:getIdentityProvider> <!--Optional:--> <xsd:federatedIdPName>TestIdP</xsd:federatedIdPName> </xsd:getIdentityProvider> </soapenv:Body> </soapenv:Envelope>
Response:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Body> <ns:getIdentityProvidersResponse xmlns:ns="http://org.apache.axis2/xsd" xmlns:ax2115="http://core.carbon.wso2.org/xsd" xmlns:ax2114="http://mgt.application.identity.carbon.wso2.org/xsd" xmlns:ax2120="http://common.application.identity.carbon.wso2.org/xsd" xmlns:ax2117="http://model.common.application.identity.carbon.wso2.org/xsd"> <ns:return xsi:type="ax2117:IdentityProvider" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> <ax2117:alias xsi:nil="true"/> <ax2117:certificate xsi:nil="true"/> <ax2117:claimConfig xsi:nil="true"/> <ax2117:defaultAuthenticatorConfig xsi:nil="true"/> <ax2117:defaultProvisioningConnectorConfig xsi:nil="true"/> <ax2117:displayName xsi:nil="true"/> <ax2117:enable>true</ax2117:enable> <ax2117:federatedAuthenticatorConfigs xsi:type="ax2117:FederatedAuthenticatorConfig"> ...</ax2117:federatedAuthenticatorConfigs> <ax2117:federationHub>false</ax2117:federationHub> <ax2117:homeRealmId xsi:nil="true"/> <ax2117:identityProviderDescription xsi:nil="true"/> <ax2117:identityProviderName>TestIdP</ax2117:identityProviderName> <ax2117:justInTimeProvisioningConfig xsi:nil="true"/> <ax2117:permissionAndRoleConfig xsi:nil="true"/> <ax2117:primary>false</ax2117:primary> <ax2117:provisioningConnectorConfigs xsi:type="ax2117:ProvisioningConnectorConfig">... </ax2117:provisioningConnectorConfigs> <ax2117:provisioningRole xsi:nil="true"/> </ns:return> </ns:getIdentityProvidersResponse> </soapenv:Body> </soapenv:Envelope>