Skip to main content
GET
/
organizations
/
{id}
/
enterprise-connections
Get enterprise connections
curl --request GET \
  --url https://api.wacht.dev/organizations/{id}/enterprise-connections \
  --cookie session_id=
[
  {
    "id": "999999999999999999",
    "organization_id": "123456789012345678",
    "organization_domain_id": "888888888888888888",
    "protocol": "saml",
    "idp_entity_id": "https://idp.example.com/entityid",
    "idp_sso_url": "https://idp.example.com/sso",
    "idp_certificate": "<string>",
    "oidc_client_id": "client_id_abc123",
    "oidc_issuer_url": "https://idp.example.com",
    "oidc_scopes": "openid email profile",
    "jit_enabled": true,
    "attribute_mapping": {},
    "scim_enabled": false,
    "scim_token_prefix": "wacht_scim...xyz",
    "created_at": "2023-11-07T05:31:56Z",
    "updated_at": "2023-11-07T05:31:56Z"
  }
]

Authorizations

session_id
string
cookie
required

Session-based authentication using cookies

Path Parameters

id
string<uint64>
required

Organization ID

Response

Connections retrieved successfully

id
string<uint64>

Connection ID

Example:

"999999999999999999"

organization_id
string<uint64>

Organization ID

Example:

"123456789012345678"

organization_domain_id
string<uint64>

Linked domain ID

Example:

"888888888888888888"

protocol
enum<string>

SSO protocol

Available options:
saml,
oidc
Example:

"saml"

idp_entity_id
string

Identity Provider Entity ID (SAML)

Example:

"https://idp.example.com/entityid"

idp_sso_url
string<uri>

Identity Provider SSO URL (SAML)

Example:

"https://idp.example.com/sso"

idp_certificate
string

Identity Provider X.509 certificate (SAML)

oidc_client_id
string

OAuth Client ID (OIDC)

Example:

"client_id_abc123"

oidc_issuer_url
string<uri>

OAuth Issuer URL (OIDC)

Example:

"https://idp.example.com"

oidc_scopes
string

OAuth scopes (OIDC)

Example:

"openid email profile"

jit_enabled
boolean

Just-In-Time provisioning enabled

Example:

true

attribute_mapping
object

Attribute mapping configuration

scim_enabled
boolean

SCIM provisioning enabled

Example:

false

scim_token_prefix
string

SCIM token prefix (partial)

Example:

"wacht_scim...xyz"

created_at
string<date-time>
updated_at
string<date-time>