My Organization API
cURL
curl --request GET \ --url https://{tenantDomain}/my-org/config/identity-providers \ --header 'Authorization: Bearer <token>'
{ "organization": { "can_set_show_as_button": true, "can_set_assign_membership_on_login": false }, "strategies": { "adfs": { "provisioning_methods": [], "enabled_features": [] }, "googleapps": { "provisioning_methods": [], "enabled_features": [] }, "oidc": { "provisioning_methods": [ "scim" ], "enabled_features": [ "provisioning" ] }, "okta": { "provisioning_methods": [ "scim" ], "enabled_features": [ "provisioning", "universal_logout" ] }, "pingfederate": { "provisioning_methods": [], "enabled_features": [] }, "samlp": { "provisioning_methods": [ "scim" ], "enabled_features": [ "provisioning", "universal_logout" ] }, "waad": { "provisioning_methods": [ "scim" ], "enabled_features": [ "provisioning" ] } } }
Retrieve the Connection Profile for this application. You should cache this information as it does not change frequently.
The access token received from the authorization server in the OAuth 2.0 flow.
Identity provider configuration successfully retrieved.
The organization config for identity providers.
Show child attributes
Strategy-specific overrides for identity providers