<html><body>
<style>

body, h1, h2, h3, div, span, p, pre, a {
  margin: 0;
  padding: 0;
  border: 0;
  font-weight: inherit;
  font-style: inherit;
  font-size: 100%;
  font-family: inherit;
  vertical-align: baseline;
}

body {
  font-size: 13px;
  padding: 1em;
}

h1 {
  font-size: 26px;
  margin-bottom: 1em;
}

h2 {
  font-size: 24px;
  margin-bottom: 1em;
}

h3 {
  font-size: 20px;
  margin-bottom: 1em;
  margin-top: 1em;
}

pre, code {
  line-height: 1.5;
  font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
}

pre {
  margin-top: 0.5em;
}

h1, h2, h3, p {
  font-family: Arial, sans serif;
}

h1, h2, h3 {
  border-bottom: solid #CCC 1px;
}

.toc_element {
  margin-top: 0.5em;
}

.firstline {
  margin-left: 2 em;
}

.method  {
  margin-top: 1em;
  border: solid 1px #CCC;
  padding: 1em;
  background: #EEE;
}

.details {
  font-weight: bold;
  font-size: 14px;
}

</style>

<h1><a href="identitytoolkit_v2.html">Identity Toolkit API</a> . <a href="identitytoolkit_v2.projects.html">projects</a> . <a href="identitytoolkit_v2.projects.tenants.html">tenants</a> . <a href="identitytoolkit_v2.projects.tenants.inboundSamlConfigs.html">inboundSamlConfigs</a></h1>
<h2>Instance Methods</h2>
<p class="toc_element">
  <code><a href="#close">close()</a></code></p>
<p class="firstline">Close httplib2 connections.</p>
<p class="toc_element">
  <code><a href="#create">create(parent, body=None, inboundSamlConfigId=None, x__xgafv=None)</a></code></p>
<p class="firstline">Create an inbound SAML configuration for an Identity Toolkit project.</p>
<p class="toc_element">
  <code><a href="#delete">delete(name, x__xgafv=None)</a></code></p>
<p class="firstline">Delete an inbound SAML configuration for an Identity Toolkit project.</p>
<p class="toc_element">
  <code><a href="#get">get(name, x__xgafv=None)</a></code></p>
<p class="firstline">Retrieve an inbound SAML configuration for an Identity Toolkit project.</p>
<p class="toc_element">
  <code><a href="#list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
<p class="firstline">List all inbound SAML configurations for an Identity Toolkit project.</p>
<p class="toc_element">
  <code><a href="#list_next">list_next()</a></code></p>
<p class="firstline">Retrieves the next page of results.</p>
<p class="toc_element">
  <code><a href="#patch">patch(name, body=None, updateMask=None, x__xgafv=None)</a></code></p>
<p class="firstline">Update an inbound SAML configuration for an Identity Toolkit project.</p>
<h3>Method Details</h3>
<div class="method">
    <code class="details" id="close">close()</code>
  <pre>Close httplib2 connections.</pre>
</div>

<div class="method">
    <code class="details" id="create">create(parent, body=None, inboundSamlConfigId=None, x__xgafv=None)</code>
  <pre>Create an inbound SAML configuration for an Identity Toolkit project.

Args:
  parent: string, The parent resource name where the config to be created, for example: &quot;projects/my-awesome-project&quot; (required)
  body: object, The request body.
    The object takes the form of:

{ # A pair of SAML RP-IDP configurations when the project acts as the relying party.
  &quot;displayName&quot;: &quot;A String&quot;, # The config&#x27;s display name set by developers.
  &quot;enabled&quot;: True or False, # True if allows the user to sign in with the provider.
  &quot;idpConfig&quot;: { # The SAML IdP (Identity Provider) configuration when the project acts as the relying party. # The SAML IdP (Identity Provider) configuration when the project acts as the relying party.
    &quot;idpCertificates&quot;: [ # IDP&#x27;s public keys for verifying signature in the assertions.
      { # The IDP&#x27;s certificate data to verify the signature in the SAMLResponse issued by the IDP.
        &quot;x509Certificate&quot;: &quot;A String&quot;, # The x509 certificate
      },
    ],
    &quot;idpEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
    &quot;signRequest&quot;: True or False, # Indicates if outbounding SAMLRequest should be signed.
    &quot;ssoUrl&quot;: &quot;A String&quot;, # URL to send Authentication request to.
  },
  &quot;name&quot;: &quot;A String&quot;, # The name of the InboundSamlConfig resource, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. Ignored during create requests.
  &quot;spConfig&quot;: { # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider.
    &quot;callbackUri&quot;: &quot;A String&quot;, # Callback URI where responses from IDP are handled.
    &quot;spCertificates&quot;: [ # Output only. Public certificates generated by the server to verify the signature in SAMLRequest in the SP-initiated flow.
      { # The SP&#x27;s certificate data for IDP to verify the SAMLRequest generated by the SP.
        &quot;expiresAt&quot;: &quot;A String&quot;, # Timestamp of the cert expiration instance.
        &quot;x509Certificate&quot;: &quot;A String&quot;, # Self-signed public certificate.
      },
    ],
    &quot;spEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
  },
}

  inboundSamlConfigId: string, The id to use for this config.
  x__xgafv: string, V1 error format.
    Allowed values
      1 - v1 error format
      2 - v2 error format

Returns:
  An object of the form:

    { # A pair of SAML RP-IDP configurations when the project acts as the relying party.
  &quot;displayName&quot;: &quot;A String&quot;, # The config&#x27;s display name set by developers.
  &quot;enabled&quot;: True or False, # True if allows the user to sign in with the provider.
  &quot;idpConfig&quot;: { # The SAML IdP (Identity Provider) configuration when the project acts as the relying party. # The SAML IdP (Identity Provider) configuration when the project acts as the relying party.
    &quot;idpCertificates&quot;: [ # IDP&#x27;s public keys for verifying signature in the assertions.
      { # The IDP&#x27;s certificate data to verify the signature in the SAMLResponse issued by the IDP.
        &quot;x509Certificate&quot;: &quot;A String&quot;, # The x509 certificate
      },
    ],
    &quot;idpEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
    &quot;signRequest&quot;: True or False, # Indicates if outbounding SAMLRequest should be signed.
    &quot;ssoUrl&quot;: &quot;A String&quot;, # URL to send Authentication request to.
  },
  &quot;name&quot;: &quot;A String&quot;, # The name of the InboundSamlConfig resource, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. Ignored during create requests.
  &quot;spConfig&quot;: { # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider.
    &quot;callbackUri&quot;: &quot;A String&quot;, # Callback URI where responses from IDP are handled.
    &quot;spCertificates&quot;: [ # Output only. Public certificates generated by the server to verify the signature in SAMLRequest in the SP-initiated flow.
      { # The SP&#x27;s certificate data for IDP to verify the SAMLRequest generated by the SP.
        &quot;expiresAt&quot;: &quot;A String&quot;, # Timestamp of the cert expiration instance.
        &quot;x509Certificate&quot;: &quot;A String&quot;, # Self-signed public certificate.
      },
    ],
    &quot;spEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
  },
}</pre>
</div>

<div class="method">
    <code class="details" id="delete">delete(name, x__xgafv=None)</code>
  <pre>Delete an inbound SAML configuration for an Identity Toolkit project.

Args:
  name: string, The resource name of the config to be deleted, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. (required)
  x__xgafv: string, V1 error format.
    Allowed values
      1 - v1 error format
      2 - v2 error format

Returns:
  An object of the form:

    { # A generic empty message that you can re-use to avoid defining duplicated empty messages in your APIs. A typical example is to use it as the request or the response type of an API method. For instance: service Foo { rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty); }
}</pre>
</div>

<div class="method">
    <code class="details" id="get">get(name, x__xgafv=None)</code>
  <pre>Retrieve an inbound SAML configuration for an Identity Toolkit project.

Args:
  name: string, The resource name of the config, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. (required)
  x__xgafv: string, V1 error format.
    Allowed values
      1 - v1 error format
      2 - v2 error format

Returns:
  An object of the form:

    { # A pair of SAML RP-IDP configurations when the project acts as the relying party.
  &quot;displayName&quot;: &quot;A String&quot;, # The config&#x27;s display name set by developers.
  &quot;enabled&quot;: True or False, # True if allows the user to sign in with the provider.
  &quot;idpConfig&quot;: { # The SAML IdP (Identity Provider) configuration when the project acts as the relying party. # The SAML IdP (Identity Provider) configuration when the project acts as the relying party.
    &quot;idpCertificates&quot;: [ # IDP&#x27;s public keys for verifying signature in the assertions.
      { # The IDP&#x27;s certificate data to verify the signature in the SAMLResponse issued by the IDP.
        &quot;x509Certificate&quot;: &quot;A String&quot;, # The x509 certificate
      },
    ],
    &quot;idpEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
    &quot;signRequest&quot;: True or False, # Indicates if outbounding SAMLRequest should be signed.
    &quot;ssoUrl&quot;: &quot;A String&quot;, # URL to send Authentication request to.
  },
  &quot;name&quot;: &quot;A String&quot;, # The name of the InboundSamlConfig resource, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. Ignored during create requests.
  &quot;spConfig&quot;: { # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider.
    &quot;callbackUri&quot;: &quot;A String&quot;, # Callback URI where responses from IDP are handled.
    &quot;spCertificates&quot;: [ # Output only. Public certificates generated by the server to verify the signature in SAMLRequest in the SP-initiated flow.
      { # The SP&#x27;s certificate data for IDP to verify the SAMLRequest generated by the SP.
        &quot;expiresAt&quot;: &quot;A String&quot;, # Timestamp of the cert expiration instance.
        &quot;x509Certificate&quot;: &quot;A String&quot;, # Self-signed public certificate.
      },
    ],
    &quot;spEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
  },
}</pre>
</div>

<div class="method">
    <code class="details" id="list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</code>
  <pre>List all inbound SAML configurations for an Identity Toolkit project.

Args:
  parent: string, The parent resource name, for example, &quot;projects/my-awesome-project&quot;. (required)
  pageSize: integer, The maximum number of items to return.
  pageToken: string, The next_page_token value returned from a previous List request, if any.
  x__xgafv: string, V1 error format.
    Allowed values
      1 - v1 error format
      2 - v2 error format

Returns:
  An object of the form:

    { # Response for ListInboundSamlConfigs
  &quot;inboundSamlConfigs&quot;: [ # The set of configs.
    { # A pair of SAML RP-IDP configurations when the project acts as the relying party.
      &quot;displayName&quot;: &quot;A String&quot;, # The config&#x27;s display name set by developers.
      &quot;enabled&quot;: True or False, # True if allows the user to sign in with the provider.
      &quot;idpConfig&quot;: { # The SAML IdP (Identity Provider) configuration when the project acts as the relying party. # The SAML IdP (Identity Provider) configuration when the project acts as the relying party.
        &quot;idpCertificates&quot;: [ # IDP&#x27;s public keys for verifying signature in the assertions.
          { # The IDP&#x27;s certificate data to verify the signature in the SAMLResponse issued by the IDP.
            &quot;x509Certificate&quot;: &quot;A String&quot;, # The x509 certificate
          },
        ],
        &quot;idpEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
        &quot;signRequest&quot;: True or False, # Indicates if outbounding SAMLRequest should be signed.
        &quot;ssoUrl&quot;: &quot;A String&quot;, # URL to send Authentication request to.
      },
      &quot;name&quot;: &quot;A String&quot;, # The name of the InboundSamlConfig resource, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. Ignored during create requests.
      &quot;spConfig&quot;: { # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider.
        &quot;callbackUri&quot;: &quot;A String&quot;, # Callback URI where responses from IDP are handled.
        &quot;spCertificates&quot;: [ # Output only. Public certificates generated by the server to verify the signature in SAMLRequest in the SP-initiated flow.
          { # The SP&#x27;s certificate data for IDP to verify the SAMLRequest generated by the SP.
            &quot;expiresAt&quot;: &quot;A String&quot;, # Timestamp of the cert expiration instance.
            &quot;x509Certificate&quot;: &quot;A String&quot;, # Self-signed public certificate.
          },
        ],
        &quot;spEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
      },
    },
  ],
  &quot;nextPageToken&quot;: &quot;A String&quot;, # Token to retrieve the next page of results, or empty if there are no more results in the list.
}</pre>
</div>

<div class="method">
    <code class="details" id="list_next">list_next()</code>
  <pre>Retrieves the next page of results.

        Args:
          previous_request: The request for the previous page. (required)
          previous_response: The response from the request for the previous page. (required)

        Returns:
          A request object that you can call &#x27;execute()&#x27; on to request the next
          page. Returns None if there are no more items in the collection.
        </pre>
</div>

<div class="method">
    <code class="details" id="patch">patch(name, body=None, updateMask=None, x__xgafv=None)</code>
  <pre>Update an inbound SAML configuration for an Identity Toolkit project.

Args:
  name: string, The name of the InboundSamlConfig resource, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. Ignored during create requests. (required)
  body: object, The request body.
    The object takes the form of:

{ # A pair of SAML RP-IDP configurations when the project acts as the relying party.
  &quot;displayName&quot;: &quot;A String&quot;, # The config&#x27;s display name set by developers.
  &quot;enabled&quot;: True or False, # True if allows the user to sign in with the provider.
  &quot;idpConfig&quot;: { # The SAML IdP (Identity Provider) configuration when the project acts as the relying party. # The SAML IdP (Identity Provider) configuration when the project acts as the relying party.
    &quot;idpCertificates&quot;: [ # IDP&#x27;s public keys for verifying signature in the assertions.
      { # The IDP&#x27;s certificate data to verify the signature in the SAMLResponse issued by the IDP.
        &quot;x509Certificate&quot;: &quot;A String&quot;, # The x509 certificate
      },
    ],
    &quot;idpEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
    &quot;signRequest&quot;: True or False, # Indicates if outbounding SAMLRequest should be signed.
    &quot;ssoUrl&quot;: &quot;A String&quot;, # URL to send Authentication request to.
  },
  &quot;name&quot;: &quot;A String&quot;, # The name of the InboundSamlConfig resource, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. Ignored during create requests.
  &quot;spConfig&quot;: { # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider.
    &quot;callbackUri&quot;: &quot;A String&quot;, # Callback URI where responses from IDP are handled.
    &quot;spCertificates&quot;: [ # Output only. Public certificates generated by the server to verify the signature in SAMLRequest in the SP-initiated flow.
      { # The SP&#x27;s certificate data for IDP to verify the SAMLRequest generated by the SP.
        &quot;expiresAt&quot;: &quot;A String&quot;, # Timestamp of the cert expiration instance.
        &quot;x509Certificate&quot;: &quot;A String&quot;, # Self-signed public certificate.
      },
    ],
    &quot;spEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
  },
}

  updateMask: string, The update mask applies to the resource. Empty update mask will result in updating nothing. For the `FieldMask` definition, see https://developers.google.com/protocol-buffers/docs/reference/google.protobuf#fieldmask
  x__xgafv: string, V1 error format.
    Allowed values
      1 - v1 error format
      2 - v2 error format

Returns:
  An object of the form:

    { # A pair of SAML RP-IDP configurations when the project acts as the relying party.
  &quot;displayName&quot;: &quot;A String&quot;, # The config&#x27;s display name set by developers.
  &quot;enabled&quot;: True or False, # True if allows the user to sign in with the provider.
  &quot;idpConfig&quot;: { # The SAML IdP (Identity Provider) configuration when the project acts as the relying party. # The SAML IdP (Identity Provider) configuration when the project acts as the relying party.
    &quot;idpCertificates&quot;: [ # IDP&#x27;s public keys for verifying signature in the assertions.
      { # The IDP&#x27;s certificate data to verify the signature in the SAMLResponse issued by the IDP.
        &quot;x509Certificate&quot;: &quot;A String&quot;, # The x509 certificate
      },
    ],
    &quot;idpEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
    &quot;signRequest&quot;: True or False, # Indicates if outbounding SAMLRequest should be signed.
    &quot;ssoUrl&quot;: &quot;A String&quot;, # URL to send Authentication request to.
  },
  &quot;name&quot;: &quot;A String&quot;, # The name of the InboundSamlConfig resource, for example: &#x27;projects/my-awesome-project/inboundSamlConfigs/my-config-id&#x27;. Ignored during create requests.
  &quot;spConfig&quot;: { # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider. # The SAML SP (Service Provider) configuration when the project acts as the relying party to receive and accept an authentication assertion issued by a SAML identity provider.
    &quot;callbackUri&quot;: &quot;A String&quot;, # Callback URI where responses from IDP are handled.
    &quot;spCertificates&quot;: [ # Output only. Public certificates generated by the server to verify the signature in SAMLRequest in the SP-initiated flow.
      { # The SP&#x27;s certificate data for IDP to verify the SAMLRequest generated by the SP.
        &quot;expiresAt&quot;: &quot;A String&quot;, # Timestamp of the cert expiration instance.
        &quot;x509Certificate&quot;: &quot;A String&quot;, # Self-signed public certificate.
      },
    ],
    &quot;spEntityId&quot;: &quot;A String&quot;, # Unique identifier for all SAML entities.
  },
}</pre>
</div>

</body></html>