Update existing authentication settings. To update the default domain, include empty value for both current_domain_value
and new_domain_value
.
You must have Instance Administrator permissions to run this endpoint.
Authorization
String
required
authorization_example
x-xdr-auth-id
String
required
xXdrAuthId_example
request_dataObjectrequired
nameString
The name of the SSO integration.
default_roleString
The default role automatically assigned to every user who authenticates to Cortex using SAML. This is an inherited role and is not the same as a direct role assigned to the user.
If a role with the same name exists on both Cortex Gateway and the tenant, the role will mapped to the role from the tenant. If you want to use specifically the role from Cortex Gateway, use the is_account_role
parameter set to true
.
is_account_roleBoolean
Whether the role was created in Cortex Gateway or in the tenant. When the value is true
, the role was created in Cortex Gateway.
current_domain_valueString
The domain whose authentication settings you want to update.
new_domain_valueString
If you want to update the domain value, include a new unique domain.
mappingsObjectrequired
These IdP attribute mappings are dependent on your organization's IdP.
emailString
The IdP attribute mapped to the user's email address in the Syslog server.
firstnameString
The IdP attribute mapped to the user's first name.
lastnameString
The IdP attribute mapped to the user's last name.
group_nameString
The IdP attribute mapped to the user's group membership for authorization.
Note: Cortex requires the IdP to send the group membership as part of the SAML token. Some IdPs send values in a format that include a comma, which is not compatible with Cortex. In that case, you must configure your IdP to send a single value without a comma for each group membership. For example, if your IdP sends the Group DN (a comma-separated list), by default, you must configure IdP to send the Group CN (Common Name) instead.
advanced_settingsObject
The advanced settings are optional to configure and some are specific for a particular IdP.
relay_stateString
The URL for a specific page that you want users to be directed to after they've been authenticated by your organization's IdP and log in to Cortex.
idp_single_logout_urlString
The URL of the IdP's Single Logout endpoint. This ensures that when a user initiates a logout from Cortex, the identity provider logs the user out of all applications in the current identity provider login session.
service_provider_public_certString
The Syslog server's public X.509 certificate in PEM format for IdP validation.
service_provider_private_keyString
The Syslog server's private key in PEM format for signing SAML responses. (This is mostly required for ADFS)
authn_context_enabledBoolean
Whether to remove the RequestedAuthnContext
parameter from SAML requests.
If true
, allows users to log in by using additional authentication methods.
force_authnBoolean
Whether to force users to reauthenticate to access the Cortex tenant if requested by the IdP, even if they already authenticated to access other applications.
idp_sso_urlString
The URL of your IdP's SSO, which is a fixed, read-only value based on your tenant's URL. If you are using this parameter, you must also specify: idp_certificate
and idp_issuer
.
idp_certificateString
The Idp's public X.509 digital certificate in PEM format for verification, which is copied from your organization's IdP.
idp_issuerString
The unique identifier of the IdP issuing SAML assertions, which is copied from your organization's IdP.
metadata_urlString
Specify your IdP SSO URL, which is a fixed, read-only value based on your tenant's URL.
{
"request_data": {
"name": "IDP configuration",
"default_role": "Analyst",
"current_domain_value": "my-test-domain.com",
"new_domain_value": "my-test-domain.org",
"mappings": {
"email": "user@company.com",
"firstname": "John",
"lastname": "Smith",
"group_name": "analysts"
},
"idp_sso_url": "https://cortex-test.okta.com/app/cortex-test/xxxxxxx/sso/SAML",
"idp_certificate": "========MY_UPDATED_TEST_CERTIFICATE_FROM_OKTA======",
"idp_issuer": "https://cortex-test.okta.com/idp",
"advanced_settings": {},
"is_account_role": true
}
}
curl -X 'POST'
-H
'Accept: application/json'
-H
'Content-Type: application/json'
-H
'Authorization: authorization_example'
-H
'x-xdr-auth-id: xXdrAuthId_example'
'https://api-yourfqdn/public_api/v1/authentication-settings/update'
-d
''