Skip to main content
POST
/
organizations
/
{id}
/
enterprise-connections
/
{connectionId}
/
update
Update enterprise connection
curl --request POST \
  --url https://api.wacht.dev/organizations/{id}/enterprise-connections/{connectionId}/update \
  --header 'Content-Type: application/x-www-form-urlencoded' \
  --cookie session_id= \
  --data 'domain_id=<string>' \
  --data 'idp_entity_id=<string>' \
  --data 'idp_sso_url=<string>' \
  --data 'idp_certificate=<string>' \
  --data 'oidc_client_id=<string>' \
  --data 'oidc_client_secret=<string>' \
  --data 'oidc_issuer_url=<string>' \
  --data 'oidc_scopes=<string>' \
  --data jit_enabled=true \
  --data 'attribute_mapping=<string>'
{
  "id": "999999999999999999",
  "organization_id": "123456789012345678",
  "organization_domain_id": "888888888888888888",
  "protocol": "saml",
  "idp_entity_id": "https://idp.example.com/entityid",
  "idp_sso_url": "https://idp.example.com/sso",
  "idp_certificate": "<string>",
  "oidc_client_id": "client_id_abc123",
  "oidc_issuer_url": "https://idp.example.com",
  "oidc_scopes": "openid email profile",
  "jit_enabled": true,
  "attribute_mapping": {},
  "scim_enabled": false,
  "scim_token_prefix": "wacht_scim...xyz",
  "created_at": "2023-11-07T05:31:56Z",
  "updated_at": "2023-11-07T05:31:56Z"
}

Authorizations

session_id
string
cookie
required

Session-based authentication using cookies

Path Parameters

id
string<uint64>
required

Organization ID

connectionId
string<uint64>
required

Connection ID

Body

application/x-www-form-urlencoded
domain_id
string<uint64>
idp_entity_id
string
idp_sso_url
string<uri>
idp_certificate
string
oidc_client_id
string
oidc_client_secret
string
oidc_issuer_url
string<uri>
oidc_scopes
string
jit_enabled
boolean
attribute_mapping
string

Response

Connection updated successfully

id
string<uint64>

Connection ID

Example:

"999999999999999999"

organization_id
string<uint64>

Organization ID

Example:

"123456789012345678"

organization_domain_id
string<uint64>

Linked domain ID

Example:

"888888888888888888"

protocol
enum<string>

SSO protocol

Available options:
saml,
oidc
Example:

"saml"

idp_entity_id
string

Identity Provider Entity ID (SAML)

Example:

"https://idp.example.com/entityid"

idp_sso_url
string<uri>

Identity Provider SSO URL (SAML)

Example:

"https://idp.example.com/sso"

idp_certificate
string

Identity Provider X.509 certificate (SAML)

oidc_client_id
string

OAuth Client ID (OIDC)

Example:

"client_id_abc123"

oidc_issuer_url
string<uri>

OAuth Issuer URL (OIDC)

Example:

"https://idp.example.com"

oidc_scopes
string

OAuth scopes (OIDC)

Example:

"openid email profile"

jit_enabled
boolean

Just-In-Time provisioning enabled

Example:

true

attribute_mapping
object

Attribute mapping configuration

scim_enabled
boolean

SCIM provisioning enabled

Example:

false

scim_token_prefix
string

SCIM token prefix (partial)

Example:

"wacht_scim...xyz"

created_at
string<date-time>
updated_at
string<date-time>