Package com.okta.sdk.resource.api
Class IdentityProviderApi
java.lang.Object
com.okta.sdk.resource.api.IdentityProviderApi
@Generated(value="org.openapitools.codegen.languages.JavaClientCodegen",
date="2026-01-29T15:26:34.455451+05:30[Asia/Kolkata]",
comments="Generator version: 7.15.0")
public class IdentityProviderApi
extends Object
-
Constructor Summary
Constructors -
Method Summary
Modifier and TypeMethodDescriptionactivateIdentityProvider(String idpId) Activate an IdP Activates an inactive identity provider (IdP)activateIdentityProvider(String idpId, Map<String, String> additionalHeaders) Activate an IdP Activates an inactive identity provider (IdP)createIdentityProvider(IdentityProvider identityProvider) Create an IdP Creates a new identity provider (IdP) integration. #### SAML 2.0 IdP You must first add the IdP's signature certificate to the IdP key store before you can add a SAML 2.0 IdP with a `kid` credential reference.createIdentityProvider(IdentityProvider identityProvider, Map<String, String> additionalHeaders) Create an IdP Creates a new identity provider (IdP) integration. #### SAML 2.0 IdP You must first add the IdP's signature certificate to the IdP key store before you can add a SAML 2.0 IdP with a `kid` credential reference.deactivateIdentityProvider(String idpId) Deactivate an IdP Deactivates an active identity provider (IdP)deactivateIdentityProvider(String idpId, Map<String, String> additionalHeaders) Deactivate an IdP Deactivates an active identity provider (IdP)voiddeleteIdentityProvider(String idpId) Delete an IdP Deletes an identity provider (IdP) integration by `idpId` * All existing IdP users are unlinked with the highest order profile source taking precedence for each IdP user. * Unlinked users keep their existing authentication provider such as `FEDERATION` or `SOCIAL`.voiddeleteIdentityProvider(String idpId, Map<String, String> additionalHeaders) Delete an IdP Deletes an identity provider (IdP) integration by `idpId` * All existing IdP users are unlinked with the highest order profile source taking precedence for each IdP user. * Unlinked users keep their existing authentication provider such as `FEDERATION` or `SOCIAL`.getIdentityProvider(String idpId) Retrieve an IdP Retrieves an identity provider (IdP) integration by `idpId`getIdentityProvider(String idpId, Map<String, String> additionalHeaders) Retrieve an IdP Retrieves an identity provider (IdP) integration by `idpId`protected static com.fasterxml.jackson.databind.ObjectMapperlistIdentityProviders(String q, String after, Integer limit, IdentityProviderType type) List all IdPs Lists all identity provider (IdP) integrations with pagination.listIdentityProviders(String q, String after, Integer limit, IdentityProviderType type, Map<String, String> additionalHeaders) List all IdPs Lists all identity provider (IdP) integrations with pagination.listIdentityProvidersPaged(String q, String after, Integer limit, IdentityProviderType type) List all IdPs (Paginated) Lists all identity provider (IdP) integrations with pagination.listIdentityProvidersPaged(String q, String after, Integer limit, IdentityProviderType type, Map<String, String> additionalHeaders) List all IdPs (Paginated with additional headers) Lists all identity provider (IdP) integrations with pagination.replaceIdentityProvider(String idpId, IdentityProvider identityProvider) Replace an IdP Replaces an identity provider (IdP) integration by `idpId`replaceIdentityProvider(String idpId, IdentityProvider identityProvider, Map<String, String> additionalHeaders) Replace an IdP Replaces an identity provider (IdP) integration by `idpId`voidsetApiClient(ApiClient apiClient)
-
Constructor Details
-
IdentityProviderApi
public IdentityProviderApi() -
IdentityProviderApi
-
-
Method Details
-
getApiClient
-
setApiClient
-
activateIdentityProvider
Activate an IdP Activates an inactive identity provider (IdP)- Parameters:
idpId- `id` of IdP (required)- Returns:
- IdentityProvider
- Throws:
ApiException- if fails to make API call
-
activateIdentityProvider
public IdentityProvider activateIdentityProvider(String idpId, Map<String, String> additionalHeaders) throws ApiExceptionActivate an IdP Activates an inactive identity provider (IdP)- Parameters:
idpId- `id` of IdP (required)additionalHeaders- additionalHeaders for this call- Returns:
- IdentityProvider
- Throws:
ApiException- if fails to make API call
-
createIdentityProvider
public IdentityProvider createIdentityProvider(IdentityProvider identityProvider) throws ApiException Create an IdP Creates a new identity provider (IdP) integration. #### SAML 2.0 IdP You must first add the IdP's signature certificate to the IdP key store before you can add a SAML 2.0 IdP with a `kid` credential reference. Don't use `fromURI` to automatically redirect a user to a particular app after successfully authenticating with a third-party IdP. Instead, use SAML deep links. Using `fromURI` isn't tested or supported. For more information about using deep links when signing users in using an SP-initiated flow, see [Understanding SP-Initiated Login flow](https://developer.okta.com/docs/concepts/saml/#understanding-sp-initiated-login-flow). Use SAML deep links to automatically redirect the user to an app after successfully authenticating with a third-party IdP. To use deep links, assemble these three parts into a URL: * SP ACS URL<br> For example: `https://${yourOktaDomain}/sso/saml2/:idpId` * The app to which the user is automatically redirected after successfully authenticating with the IdP <br> For example: `/app/:app-location/:appId/sso/saml` * Optionally, if the app is an outbound SAML app, you can specify the `relayState` passed to it.<br> For example: `?RelayState=:anyUrlEncodedValue` The deep link for the above three parts is:<br> `https://${yourOktaDomain}/sso/saml2/:idpId/app/:app-location/:appId/sso/saml?RelayState=:anyUrlEncodedValue` #### Smart Card X509 IdP You must first add the IdP's server certificate to the IdP key store before you can add a Smart Card `X509` IdP with a `kid` credential reference. You need to upload the whole trust chain as a single key using the [Key Store API](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProviderKeys/#tag/IdentityProviderKeys/operation/createIdentityProviderKey). Depending on the information stored in the smart card, select the proper [template](https://developer.okta.com/docs/reference/okta-expression-language/#idp-user-profile) `idpuser.subjectAltNameEmail` or `idpuser.subjectAltNameUpn`. #### Identity verification vendors as identity providers Identity verification (IDV) vendors work like IdPs, with a few key differences. IDV vendors verify your user's identities by requiring them to submit a proof of identity. There are many ways to verify user identities. For example, a proof of identity can be a selfie to determine liveliness or it can be requiring users to submit a photo of their driver's license and matching that information with a database. There are three IDV vendors (Persona, CLEAR Verified, and Incode) with specific configuration settings and another IDV vendor type (Custom IDV) that lets you create a custom IDV vendor, using a [standardized IDV process](https://developer.okta.com/docs/guides/idv-integration/main/). You can configure each of the IDV vendors as IdPs in your org by creating an account with the vendor, and then creating an IdP integration. Control how the IDVs verify your users by using [Okta account management policy rules](https://developer.okta.com/docs/guides/okta-account-management-policy/main/). * [Persona](https://withpersona.com/) * [CLEAR Verified](https://www.clearme.com/) * [Incode](https://incode.com/) * [Custom IDV](https://help.okta.com/okta_help.htm?type=oie&id=idp-add-custom-idv-vendor)- Parameters:
identityProvider- IdP settings (required)- Returns:
- IdentityProvider
- Throws:
ApiException- if fails to make API call
-
createIdentityProvider
public IdentityProvider createIdentityProvider(IdentityProvider identityProvider, Map<String, String> additionalHeaders) throws ApiExceptionCreate an IdP Creates a new identity provider (IdP) integration. #### SAML 2.0 IdP You must first add the IdP's signature certificate to the IdP key store before you can add a SAML 2.0 IdP with a `kid` credential reference. Don't use `fromURI` to automatically redirect a user to a particular app after successfully authenticating with a third-party IdP. Instead, use SAML deep links. Using `fromURI` isn't tested or supported. For more information about using deep links when signing users in using an SP-initiated flow, see [Understanding SP-Initiated Login flow](https://developer.okta.com/docs/concepts/saml/#understanding-sp-initiated-login-flow). Use SAML deep links to automatically redirect the user to an app after successfully authenticating with a third-party IdP. To use deep links, assemble these three parts into a URL: * SP ACS URL<br> For example: `https://${yourOktaDomain}/sso/saml2/:idpId` * The app to which the user is automatically redirected after successfully authenticating with the IdP <br> For example: `/app/:app-location/:appId/sso/saml` * Optionally, if the app is an outbound SAML app, you can specify the `relayState` passed to it.<br> For example: `?RelayState=:anyUrlEncodedValue` The deep link for the above three parts is:<br> `https://${yourOktaDomain}/sso/saml2/:idpId/app/:app-location/:appId/sso/saml?RelayState=:anyUrlEncodedValue` #### Smart Card X509 IdP You must first add the IdP's server certificate to the IdP key store before you can add a Smart Card `X509` IdP with a `kid` credential reference. You need to upload the whole trust chain as a single key using the [Key Store API](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProviderKeys/#tag/IdentityProviderKeys/operation/createIdentityProviderKey). Depending on the information stored in the smart card, select the proper [template](https://developer.okta.com/docs/reference/okta-expression-language/#idp-user-profile) `idpuser.subjectAltNameEmail` or `idpuser.subjectAltNameUpn`. #### Identity verification vendors as identity providers Identity verification (IDV) vendors work like IdPs, with a few key differences. IDV vendors verify your user's identities by requiring them to submit a proof of identity. There are many ways to verify user identities. For example, a proof of identity can be a selfie to determine liveliness or it can be requiring users to submit a photo of their driver's license and matching that information with a database. There are three IDV vendors (Persona, CLEAR Verified, and Incode) with specific configuration settings and another IDV vendor type (Custom IDV) that lets you create a custom IDV vendor, using a [standardized IDV process](https://developer.okta.com/docs/guides/idv-integration/main/). You can configure each of the IDV vendors as IdPs in your org by creating an account with the vendor, and then creating an IdP integration. Control how the IDVs verify your users by using [Okta account management policy rules](https://developer.okta.com/docs/guides/okta-account-management-policy/main/). * [Persona](https://withpersona.com/) * [CLEAR Verified](https://www.clearme.com/) * [Incode](https://incode.com/) * [Custom IDV](https://help.okta.com/okta_help.htm?type=oie&id=idp-add-custom-idv-vendor)- Parameters:
identityProvider- IdP settings (required)additionalHeaders- additionalHeaders for this call- Returns:
- IdentityProvider
- Throws:
ApiException- if fails to make API call
-
deactivateIdentityProvider
Deactivate an IdP Deactivates an active identity provider (IdP)- Parameters:
idpId- `id` of IdP (required)- Returns:
- IdentityProvider
- Throws:
ApiException- if fails to make API call
-
deactivateIdentityProvider
public IdentityProvider deactivateIdentityProvider(String idpId, Map<String, String> additionalHeaders) throws ApiExceptionDeactivate an IdP Deactivates an active identity provider (IdP)- Parameters:
idpId- `id` of IdP (required)additionalHeaders- additionalHeaders for this call- Returns:
- IdentityProvider
- Throws:
ApiException- if fails to make API call
-
deleteIdentityProvider
Delete an IdP Deletes an identity provider (IdP) integration by `idpId` * All existing IdP users are unlinked with the highest order profile source taking precedence for each IdP user. * Unlinked users keep their existing authentication provider such as `FEDERATION` or `SOCIAL`.- Parameters:
idpId- `id` of IdP (required)- Throws:
ApiException- if fails to make API call
-
deleteIdentityProvider
public void deleteIdentityProvider(String idpId, Map<String, String> additionalHeaders) throws ApiExceptionDelete an IdP Deletes an identity provider (IdP) integration by `idpId` * All existing IdP users are unlinked with the highest order profile source taking precedence for each IdP user. * Unlinked users keep their existing authentication provider such as `FEDERATION` or `SOCIAL`.- Parameters:
idpId- `id` of IdP (required)additionalHeaders- additionalHeaders for this call- Throws:
ApiException- if fails to make API call
-
getIdentityProvider
Retrieve an IdP Retrieves an identity provider (IdP) integration by `idpId`- Parameters:
idpId- `id` of IdP (required)- Returns:
- IdentityProvider
- Throws:
ApiException- if fails to make API call
-
getIdentityProvider
public IdentityProvider getIdentityProvider(String idpId, Map<String, String> additionalHeaders) throws ApiExceptionRetrieve an IdP Retrieves an identity provider (IdP) integration by `idpId`- Parameters:
idpId- `id` of IdP (required)additionalHeaders- additionalHeaders for this call- Returns:
- IdentityProvider
- Throws:
ApiException- if fails to make API call
-
listIdentityProviders
public List<IdentityProvider> listIdentityProviders(String q, String after, Integer limit, IdentityProviderType type) throws ApiException List all IdPs Lists all identity provider (IdP) integrations with pagination. A subset of IdPs can be returned that match a supported filter expression or query.- Parameters:
q- Searches the `name` property of IdPs for matching value (optional)after- The cursor to use for pagination. It is an opaque string that specifies your current location in the list and is obtained from the `Link` response header. See [Pagination](https://developer.okta.com/docs/api/#pagination) and [Link header](https://developer.okta.com/docs/api/#link-header). (optional)limit- A limit on the number of objects to return (optional, default to 20)type- Filters IdPs by `type` (optional)- Returns:
- List<IdentityProvider>
- Throws:
ApiException- if fails to make API call
-
listIdentityProviders
public List<IdentityProvider> listIdentityProviders(String q, String after, Integer limit, IdentityProviderType type, Map<String, String> additionalHeaders) throws ApiExceptionList all IdPs Lists all identity provider (IdP) integrations with pagination. A subset of IdPs can be returned that match a supported filter expression or query.- Parameters:
q- Searches the `name` property of IdPs for matching value (optional)after- The cursor to use for pagination. It is an opaque string that specifies your current location in the list and is obtained from the `Link` response header. See [Pagination](https://developer.okta.com/docs/api/#pagination) and [Link header](https://developer.okta.com/docs/api/#link-header). (optional)limit- A limit on the number of objects to return (optional, default to 20)type- Filters IdPs by `type` (optional)additionalHeaders- additionalHeaders for this call- Returns:
- List<IdentityProvider>
- Throws:
ApiException- if fails to make API call
-
listIdentityProvidersPaged
public Iterable<IdentityProvider> listIdentityProvidersPaged(String q, String after, Integer limit, IdentityProviderType type) List all IdPs (Paginated) Lists all identity provider (IdP) integrations with pagination. A subset of IdPs can be returned that match a supported filter expression or query. This method returns a lazy, paginated iterable that automatically handles pagination. It is thread-safe and does not cause memory leaks. Use this method in a for-each loop to automatically fetch all pages without manual cursor management.- Parameters:
q- Searches the `name` property of IdPs for matching value (optional)after- The cursor to use for pagination. It is an opaque string that specifies your current location in the list and is obtained from the `Link` response header. See [Pagination](https://developer.okta.com/docs/api/#pagination) and [Link header](https://developer.okta.com/docs/api/#link-header). (optional)limit- A limit on the number of objects to return (optional, default to 20)type- Filters IdPs by `type` (optional)- Returns:
- Iterable<IdentityProvider> lazy iterable over all pages
-
listIdentityProvidersPaged
public Iterable<IdentityProvider> listIdentityProvidersPaged(String q, String after, Integer limit, IdentityProviderType type, Map<String, String> additionalHeaders) List all IdPs (Paginated with additional headers) Lists all identity provider (IdP) integrations with pagination. A subset of IdPs can be returned that match a supported filter expression or query. This method returns a lazy, paginated iterable that automatically handles pagination. It is thread-safe and does not cause memory leaks.- Parameters:
q- Searches the `name` property of IdPs for matching value (optional)after- The cursor to use for pagination. It is an opaque string that specifies your current location in the list and is obtained from the `Link` response header. See [Pagination](https://developer.okta.com/docs/api/#pagination) and [Link header](https://developer.okta.com/docs/api/#link-header). (optional)limit- A limit on the number of objects to return (optional, default to 20)type- Filters IdPs by `type` (optional)additionalHeaders- additional headers for this call- Returns:
- Iterable<IdentityProvider> lazy iterable over all pages
-
replaceIdentityProvider
public IdentityProvider replaceIdentityProvider(String idpId, IdentityProvider identityProvider) throws ApiException Replace an IdP Replaces an identity provider (IdP) integration by `idpId`- Parameters:
idpId- `id` of IdP (required)identityProvider- Updated configuration for the IdP (required)- Returns:
- IdentityProvider
- Throws:
ApiException- if fails to make API call
-
replaceIdentityProvider
public IdentityProvider replaceIdentityProvider(String idpId, IdentityProvider identityProvider, Map<String, String> additionalHeaders) throws ApiExceptionReplace an IdP Replaces an identity provider (IdP) integration by `idpId`- Parameters:
idpId- `id` of IdP (required)identityProvider- Updated configuration for the IdP (required)additionalHeaders- additionalHeaders for this call- Returns:
- IdentityProvider
- Throws:
ApiException- if fails to make API call
-
getObjectMapper
protected static com.fasterxml.jackson.databind.ObjectMapper getObjectMapper()
-