Obtaining IdP Configuration Details Using API

This article provides information on managing Zscaler Private Access (ZPA) IdP configurations using APIs. All APIs are rate limited. To learn more, see Understanding Rate Limiting.

Getting Details for All IdPs V2

To get the configured IdP details:

  1. Send a GET request to the following endpoint in the idp-controller: /mgmtconfig/v2/admin/customers/{customerId}/idp.
  2. Provide the customerId, the ZPA tenant ID of the customer, in the request endpoint. For example: /mgmtconfig/v2/admin/customers/217246660302995456/idp.
  • {
      "totalPages": "3",
      "list": [
        {
          "id": "217246660303022670",
          "modifiedTime": "1619718855",
          "creationTime": "1547402803",
          "modifiedBy": "217246660303024869",
          "name": "Custom entityId IDP configuration - User sso - do NOT delete Changed",
          "loginUrl": "https://mockcompany2.okta.com/app/mockcompany2_mymockcomanydomusersso_1/exkli5sevfsnKhh6n0x7/sso/saml",
          "idpEntityId": "http://www.okta.com/exkli5sevfsnKhh6n0x7",
          "autoProvision": "0",
          "signSamlRequest": "1",
          "ssoType": [
            "USER"
          ],
          "domainList": [
            "mockcompany.com"
          ],
          "useCustomSPMetadata": false,
          "scimEnabled": false,
          "enableScimBasedPolicy": false,
          "disableSamlBasedPolicy": false,
          "reauthOnUserUpdate": false,
          "userSpSigningCertId": "0",
          "adminSpSigningCertId": "0",
          "scimSharedSecretExists": false,
          "forceAuth": false,
          "enabled": true,
          "redirectBinding": false
        },
        {
          "id": "217246660303022599",
          "modifiedTime": "1624663236",
          "creationTime": "1542394689",
          "modifiedBy": "72057594037928105",
          "name": "IDP Config - Admin SSO",
          "loginUrl": "https://mockcompany2.okta.com/app/mockcompany2_zpaadminsso_1/exkgdl7ctkw3I3cWW0x7/sso/saml",
          "idpEntityId": "http://www.okta.com/exkgdl7ctkw3I3cWW0x7",
          "autoProvision": "0",
          "signSamlRequest": "0",
          "ssoType": [
            "ADMIN"
          ],
          "domainList": [
            "mockcompany.com"
          ],
          "useCustomSPMetadata": false,
          "scimEnabled": false,
          "enableScimBasedPolicy": false,
          "disableSamlBasedPolicy": false,
          "reauthOnUserUpdate": false,
          "adminSpSigningCertId": "0",
          "scimSharedSecretExists": false,
          "forceAuth": false,
          "enabled": true,
          "redirectBinding": true
        }
      ]
    }
    Close

A successful response returns code 200. To learn more, see API Response Codes and Error Messages.

This API supports pagination. To get a paginated response:

  1. Send a GET request to the following endpoint: /mgmtconfig/v2/admin/customers/{customerId}/idp?page=1&pagesize=20.
  2. Provide the following in the request endpoint:
  • customerId: The ZPA tenant ID of the customer.
  • Valid values for page and page size parameters.

For example: /mgmtconfig/v2/admin/customers/217246660302995456/idp?page=1&pagesize=2.

  • {
      "totalPages": "3",
      "list": [
        {
          "id": "217246660303022670",
          "modifiedTime": "1648147227",
          "creationTime": "1547402803",
          "modifiedBy": "72057594038052745",
          "name": "Test entityId IDP configuration - User sso",
          "loginUrl": "https://testcompany.okta.com/app/testcompany_mytestcomanydomusersso_1/exkli5sevfsnKhh6n0x/sso/saml",
          "idpEntityId": "http://www.okta.com/exkli5sevfsnKhh6n0x7",
          "autoProvision": "0",
          "signSamlRequest": "1",
          "ssoType": [
            "USER"
          ],
          "domainList": [
            "mockcompany.com"
          ],
          "useCustomSPMetadata": false,
          "scimEnabled": false,
          "enableScimBasedPolicy": false,
          "disableSamlBasedPolicy": false,
          "reauthOnUserUpdate": false,
          "userSpSigningCertId": "0",
          "adminSpSigningCertId": "0",
          "scimSharedSecretExists": false,
          "forceAuth": false,
          "enabled": true,
          "redirectBinding": false
        },
        {
          "id": "217246660303022599",
          "modifiedTime": "1624663236",
          "creationTime": "1542394689",
          "modifiedBy": "72057594037928105",
          "name": "IDP Config - Admin SSO",
          "loginUrl": "https://testcompany.com/app/testcompany_zpaadminsso_1/exkgdl7ctkw3I3cWW0x7/sso/saml",
          "idpEntityId": "http://www.okta.com/exkgdl7ctkw3I3cWW0x7",
          "autoProvision": "0",
          "signSamlRequest": "0",
          "ssoType": [
            "ADMIN"
          ],
          "domainList": [
            "mockcompany.com"
          ],
          "useCustomSPMetadata": false,
          "scimEnabled": false,
          "enableScimBasedPolicy": false,
          "disableSamlBasedPolicy": false,
          "reauthOnUserUpdate": false,
          "adminSpSigningCertId": "0",
          "scimSharedSecretExists": false,
          "forceAuth": false,
          "enabled": true,
          "redirectBinding": true
        }
      ]
    }
    Close

If not provided, the default page size is 20. The maximum page size is 500.

A successful response returns code 200. To learn more, see API Response Codes and Error Messages.

This API supports a search option to search by features and fields. To search by features and fields:

  1. Send a GET request to the following endpoint: /mgmtconfig/v1/admin/customers/73186051597795328/idp&search={searchString}.
  2. Provide the following in the request endpoint:
  • customerId: The ZPA tenant ID of the customer.
  • Valid search string values. The search string values are in the format fieldName operator fieldValue. Only search string values that correspond to the values for valid fields and filters are supported. For example, the string name%20LIKE%20test is supported for the Name filter, using the Contains (LIKE) operator, for the test filter value.

For example: /mgmtconfig/v1/admin/customers/73186051597795328/idp&search=name%20LIKE%20test.

  • {
      "totalPages": "2",
      "totalCount": "2",
      "list": [
        {
          "id": "72057594037961373",
          "modifiedTime": "1668808938",
          "creationTime": "1572496367",
          "modifiedBy": "72057594038006517",
          "name": "test2",
          "loginUrl": "http://test.com/sso",
          "idpEntityId": "https://test1.com",
          "autoProvision": "0",
          "signSamlRequest": "1",
          "ssoType": [
            "USER"
          ],
          "domainList": [
            "1467901757270.com"
          ],
          "useCustomSPMetadata": true,
          "scimEnabled": true,
          "enableScimBasedPolicy": true,
          "disableSamlBasedPolicy": false,
          "reauthOnUserUpdate": false,
          "userSpSigningCertId": "0",
          "enableArbitraryAuthDomains": "0",
          "scimSharedSecretExists": false,
          "forceAuth": false,
          "loginHint": true,
          "enabled": true,
          "redirectBinding": true
        }
      ]
    }
    
    Close

If you use the ZPA API PortaI or the Reference Guide to make your API calls, the search field string does not require any characters. For example, name%20LIKE%20test is name LIKE test.

A successful response returns code 200. To learn more, see API Response Codes and Error Messages.

Getting Details for a Particular IdP

To get details for a particular IdP:

  1. Send a GET request to following endpoint: /mgmtconfig/v1/admin/customers/{customerId}/idp/{idpId} in the idp-controller.
  2. Provide the following values in the request endpoint:
  • customerId: The ZPA tenant ID of the customer.
  • idpId: The ID of the desired IdP.

For example: /mgmtconfig/v1/admin/customers/72057615512764416/idp/72057615512764510.

  • {
      "id": "72057615512764510",
      "modifiedTime": "1571334125",
      "creationTime": "1571334045",
      "modifiedBy": "72057615512764417",
      "name": "AAD",
      "certificates": [
        {
          "cName": "Microsoft Azure Federated SSO Certificate",
          "serialNo": "52394493998477153587022235475127474407",
          "certificate": "-----BEGIN CERTIFICATE-----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\nY/9cwLyFLj3fjRI3f/Qa2gkKU8f1WAqHXhBIPS/4XPaDU4IJ\n-----END CERTIFICATE-----\n",
          "validFromInSec": "1571333996",
          "validToInSec": "1666028396"
        }
      ],
      "loginUrl": "https://login.microsoftonline.com/fe4036f5-76ad-4232-9bda-313544c3ad54/saml2",
      "idpEntityId": "https://sts.windows.net/fe4036f5-76ad-4232-9bda-313544c3ad54/",
      "autoProvision": "0",
      "signSamlRequest": "1",
      "ssoType": [
        "USER"
      ],
      "domainList": [
        "lanuk.net"
      ],
      "useCustomSPMetadata": true,
      "scimEnabled": true,
      "enableScimBasedPolicy": false,
      "disableSamlBasedPolicy": false,
      "reauthOnUserUpdate": false,
      "userMetadata": {
        "spEntityId": "https://samlsp.zpabeta.net/auth/metadata/72057615512764510",
        "spPostUrl": "https://samlsp.zpabeta.net/auth/72057615512764510/sso",
        "certificateUrl": "https://samlsp.zpabeta.net/auth/certificate",
        "spMetadataUrl": "https://samlsp.zpabeta.net/auth/72057615512764510/metadata"
      },
      "scimServiceProviderEndpoint": "https://scim1.zpabeta.net/scim/1/72057615512764510/v2",
      "scimSharedSecretExists": true,
      "forceAuth": false,
      "enabled": true,
      "redirectBinding": true
    }
    
    
    Close

A successful response returns code 200. To learn more, see API Response Codes and Error Messages.