This command modifies a new or existing Identity Provider (IDP).
Usage
vms modify_saml --idp-name IDP_NAME
[--idp-entityid ENTITY_ID]
[--encrypt-assertion]
[--disable-encrypt-assertion]
[--want-assertions-or-response-signed]
[--force-authn]
[--disable-force-authn]
[--local-idp-metadata]
[--idp-metadata-url METADATA_URL]
[--remove-idp-metadata local|remote]
Required Parameters
| Specifies the name of the new IDP configuration, or the name of a previously configured IDP to modify. This field is used later for the SSO login URL for the SP (VMS). |
Options
| The unique identifier of the IDP entity. |
| This option is required if the IDP encrypts the assertion. If this option is used, you are prompted for the certificate and key. |
| This option removes the certificate used in |
| If this option is used the SP (VMS) will accept only a signed response or signed assertion from the IDP. VMS will fail the user authentication if an unsigned response is received. If this option is used, a certificate and key must be provided after executing the command. |
| Forces authentication with the IDP even if there is an active session with the IdP for the user. |
| Disable the |
| Use local metadata. If used, you are prompted for the metadata (must be in XML file format). |
| Use metadata located at METADATA_URL. The URL is typically in the format: |
| This option will remove either the local or remote IDP metadata file. Specify which file to remove, local or remote. For example: vms modify_saml --remove-idp-metadata local |
Examples
vcli: admin> vms modify_saml --idp-name Okta --force-authn
This action will impact you saml login with Okta.
Are you sure you want to continue? [y/N] y
Saml Config as been changed for Okta
vcli: admin> vms modify_saml --idp-name Okta --idp-metadata-url https://dev-46872236.okta.com/app/ekxm4bscg4RuruH8C5g7/sso/saml/metadata --idp-entityid http://www.okta.com/ewkh4aftf7NerrH4C5t1
This action will impact you saml login with Okta.
Are you sure you want to continue? [y/N] y
Saml Config as been changed for Okta
With encrypted assertions (requires certificate):
vms modify_saml --idp-entityid http://www.okta.com/ewkh4aftf7NerrH4C5t1 --idp-metadata-url https://dev-46872236.okta.com/app/ekxm4bscg4RuruH8C5g7/sso/saml/metadata --idp-name Okta --encrypt_assertion
This action will impact your saml login with Okta.
Are you sure you want to continue? [y/N] y
Please enter idp signing certificate (ALT+ENTER/option+ENTER to finish):
PUT_CERTIFICATE_FILE_CONTENT
Please enter idp signing certificate key (ALT+ENTER/option+ENTER to finish):
PUT_KEY_FILE_CONTENT