Update OIDC SSO configuration

PUT https://www.digicert.com/services/v2/sso/oidc/entity
Use this endpoint to update your OpenID Connect (OIDC) SSO configuration.

Example requests and responses

cURL

curl --request PUT 'https://www.digicert.com/services/v2/sso/oidc/entity' \
--header 'X-DC-DEVKEY: {{api_key}}' \
--header 'Content-Type: application/json' \
--data-raw '{
    "provider_url": "https://provider.example.com/",
    "client_id": "client_id",
    "client_secret": "client_secret",
    "friendly_name": "Public Friendly Name",
    "scope_parameter": "preferred_username",
    "discoverable": true
}'

204 No Content

// No content

Request parameters

NameReq/OptTypeDescription
provider_urlrequiredstringURL for your Identity Provider (IdP). Get this value from your IdP service.
client_idrequiredstringClient ID from your IdP that CertCentral can use to identify itself in requests to your OIDC service.
client_secretrequiredstringPassword from your IdP that CertCentral can use to authenticate requests to your OIDC service.
friendly_namerequiredstringCustom SSO provider friendly name. If discoverable is true, this friendly name is visible to anyone who visits DigiCert’s public SSO login pages.
scope_parameterrequiredstringID token claim attribute to match with the username.
Allowed values:
discoverableoptionalbooleanIf true, your provider friendly name appears in the list of IdPs for anyone who visits DigiCert’s public SSO pages.
Default: false