Enable
organizations.sso_connection.enable(strorganization_id, SSOConnectionEnableParams**kwargs) -> SSOConnection
POST/organizations/{organization_id}/sso-connection
Enable SSO for organization
Parameters
organization_id: str
Organization ID or label identifier
minLength1
maxLength255
client_id: str
OAuth 2.0 client ID
identifier: str
SSO provider identifier (e.g., issuer URL)
minLength1
maxLength2048
client_secret: Optional[str]
OAuth 2.0 client secret (optional, will be encrypted if provided)
x_client_request_id: Optional[str]
formatuuid
Returns
Enable
from keycardai_api import KeycardAPI
client = KeycardAPI()
sso_connection = client.organizations.sso_connection.enable(
organization_id="x",
client_id="client_id",
identifier="x",
)
print(sso_connection.id){
"id": "id",
"client_id": "client_id",
"client_secret_set": true,
"created_at": "2019-12-27T18:11:19.117Z",
"identifier": "x",
"updated_at": "2019-12-27T18:11:19.117Z",
"permissions": {
"organizations": {
"read": true,
"update": true
},
"users": {
"read": true,
"list": true
}
},
"protocols": {
"oauth2": {
"authorization_endpoint": "https://example.com",
"code_challenge_methods_supported": [
"string"
],
"jwks_uri": "https://example.com",
"registration_endpoint": "https://example.com",
"scopes_supported": [
"string"
],
"token_endpoint": "https://example.com"
},
"openid": {
"userinfo_endpoint": "https://example.com"
}
}
}Returns Examples
{
"id": "id",
"client_id": "client_id",
"client_secret_set": true,
"created_at": "2019-12-27T18:11:19.117Z",
"identifier": "x",
"updated_at": "2019-12-27T18:11:19.117Z",
"permissions": {
"organizations": {
"read": true,
"update": true
},
"users": {
"read": true,
"list": true
}
},
"protocols": {
"oauth2": {
"authorization_endpoint": "https://example.com",
"code_challenge_methods_supported": [
"string"
],
"jwks_uri": "https://example.com",
"registration_endpoint": "https://example.com",
"scopes_supported": [
"string"
],
"token_endpoint": "https://example.com"
},
"openid": {
"userinfo_endpoint": "https://example.com"
}
}
}