Update OIDC SSO configuration
less than a minute
PUT
Use this endpoint to update your OpenID Connect (OIDC) SSO configuration.https://www.digicert.com/services/v2/sso/oidc/entity
Example requests and responses
cURL
curl --request PUT 'https://www.digicert.com/services/v2/sso/oidc/entity' \
--header 'X-DC-DEVKEY: {{api_key}}' \
--header 'Content-Type: application/json' \
--data-raw '{
"provider_url": "https://provider.example.com/",
"client_id": "client_id",
"client_secret": "client_secret",
"friendly_name": "Public Friendly Name",
"scope_parameter": "preferred_username",
"discoverable": true
}'
204 No Content
// No content
Request parameters
| Name | Req/Opt | Type | Description |
|---|---|---|---|
| provider_url | required | string | URL for your Identity Provider (IdP). Get this value from your IdP service. |
| client_id | required | string | Client ID from your IdP that CertCentral can use to identify itself in requests to your OIDC service. |
| client_secret | required | string | Password from your IdP that CertCentral can use to authenticate requests to your OIDC service. |
| friendly_name | required | string | Custom SSO provider friendly name. If discoverable is true, this friendly name is visible to anyone who visits DigiCert’s public SSO login pages. |
| scope_parameter | required | string | ID token claim attribute to match with the username. Allowed values: |
| discoverable | optional | boolean | If true, your provider friendly name appears in the list of IdPs for anyone who visits DigiCert’s public SSO pages. Default: false |
Was this page helpful?
Provide feedback