OIDC SSO configuration details
2 minute read
GET
Use this endpoint to get configuration details for your OpenID Connect (OIDC) SSO configuration.https://www.digicert.com/services/v2/sso/oidc/entity
Example requests and responses
cURL
curl --request GET 'https://www.digicert.com/services/v2/sso/oidc/entity' \
--header 'X-DC-DEVKEY: {{api_key}}' \
--header 'Content-Type: application/json'
200 Created
{
"provider_url": "https://provider.example.com/",
"friendly_name": "OIDC Test",
"slug_name": "oidc-test",
"client_id": "client_id",
"client_secret": "client_secret",
"discoverable": false,
"scope_parameter": "preferred_username",
"date_created": "2022-11-30 14:55:40"
}
Response parameters
| Name | Type | Description |
|---|---|---|
| provider_url | string | URL for your Identity Provider (IdP). |
| friendly_name | string | Custom SSO provider friendly name. If discoverable is true, this friendly name is visible to anyone who visits DigiCert’s public SSO login pages. |
| slug_name | string | String used in the login initiation URL that users can access to sign in to CertCentral using OIDC-based SSO. The slug_name value is based on the friendly_name value. When you change the friendly name, the slug name also changes. |
| client_id | string | Client ID from your IdP that CertCentral can use to identify itself in requests to your OIDC service. |
| client_secret | string | Password from your IdP that CertCentral can use to authenticate requests to your OIDC service. |
| discoverable | boolean | If true, your provider friendly name appears in the list of IdPs for anyone who visits DigiCert’s public SSO pages. Otherwise, false. |
| scope_parameter | string | ID token claim attribute to match with the username. Possible values: |
| date_created | string | Date and time OIDC was configured for the account. Format: UTC timezone and ISO 8601 date |
Was this page helpful?
Provide feedback