Create an oidc configuration
Creates a new oidc configuration.
POST/v3/accounts/{id}/oidc-configuration
JWT
account:write
Parameters
| Name | Type | In | Description |
|---|---|---|---|
| id* | string | path |
Request Body Schema
| Property | Type | Description | Constraints |
|---|---|---|---|
| issuerUrl* | string | OIDC Issuer URL. | min: 1, max: 2048, format: uri |
| clientId* | string | OIDC Client ID. | min: 1, max: 2048 |
| additionalClientIds | array | Additional Client IDs that are authorized. | items: string |
| defaultRole* | string | Default role assigned to the new users. | min: 1, max: 256 |
| autoProvisionUsers* | boolean | If enabled, a new User in Cryptlex is automatically created at first sign-in. | |
| roleMappings | array | Role mappings. | items: object |
| identityProviderRole* | string | Identity provider role. | min: 1, max: 256 |
| serviceProviderRole* | string | Service provider role. | min: 1, max: 256 |
| enabled* | boolean | Enable or disable the OIDC SSO. | |
| claimMapping | object | ||
| array | JWT claim to map to the User email. User will not be created if an email is not found. By default, the email is mapped to 'email' property in the [UserInfo response](https://openid.net/specs/openid-connect-core-1_0.html#UserInfoResponse). | items: string | |
| name | array | JWT claim to map to the User name. Name will be set to 'External User' if not found. | items: string |
| role | array | JWT claim to map to the User role. Default role will used if not found. | items: string |
Request Example
Responses
200
400
401
403
404
409
429
500