netscaler.adc.authenticationsamlidpprofile module – Configuration for AAA Saml IdentityProvider (IdP) profile resource.
Note
This module is part of the netscaler.adc collection (version 2.6.0).
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install netscaler.adc
.
To use it in a playbook, specify: netscaler.adc.authenticationsamlidpprofile
.
New in netscaler.adc 2.0.0
Synopsis
Configuration for AAA Saml IdentityProvider (IdP) profile resource.
Parameters
Parameter |
Comments |
---|---|
Expression that will be evaluated to allow Assertion Consumer Service URI coming in the SAML Request |
|
Base NITRO API path. Define only in case of an ADM service proxy call Default: |
|
URL to which the assertion is to be sent. |
|
Name of attribute1 that needs to be sent in SAML Assertion |
|
Name of attribute10 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute10’s value to be sent in Assertion |
|
Format of Attribute10 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute10 that needs to be sent in SAML Assertion |
|
Name of attribute11 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute11’s value to be sent in Assertion |
|
Format of Attribute11 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute11 that needs to be sent in SAML Assertion |
|
Name of attribute12 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute12’s value to be sent in Assertion |
|
Format of Attribute12 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute12 that needs to be sent in SAML Assertion |
|
Name of attribute13 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute13’s value to be sent in Assertion |
|
Format of Attribute13 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute13 that needs to be sent in SAML Assertion |
|
Name of attribute14 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute14’s value to be sent in Assertion |
|
Format of Attribute14 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute14 that needs to be sent in SAML Assertion |
|
Name of attribute15 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute15’s value to be sent in Assertion |
|
Format of Attribute15 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute15 that needs to be sent in SAML Assertion |
|
Name of attribute16 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute16’s value to be sent in Assertion |
|
Format of Attribute16 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute16 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute1’s value to be sent in Assertion |
|
Format of Attribute1 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute1 that needs to be sent in SAML Assertion |
|
Name of attribute2 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute2’s value to be sent in Assertion |
|
Format of Attribute2 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute2 that needs to be sent in SAML Assertion |
|
Name of attribute3 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute3’s value to be sent in Assertion |
|
Format of Attribute3 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute3 that needs to be sent in SAML Assertion |
|
Name of attribute4 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute4’s value to be sent in Assertion |
|
Format of Attribute4 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute4 that needs to be sent in SAML Assertion |
|
Name of attribute5 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute5’s value to be sent in Assertion |
|
Format of Attribute5 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute5 that needs to be sent in SAML Assertion |
|
Name of attribute6 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute6’s value to be sent in Assertion |
|
Format of Attribute6 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute6 that needs to be sent in SAML Assertion |
|
Name of attribute7 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute7’s value to be sent in Assertion |
|
Format of Attribute7 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute7 that needs to be sent in SAML Assertion |
|
Name of attribute8 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute8’s value to be sent in Assertion |
|
Format of Attribute8 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute8 that needs to be sent in SAML Assertion |
|
Name of attribute9 that needs to be sent in SAML Assertion |
|
Expression that will be evaluated to obtain attribute9’s value to be sent in Assertion |
|
Format of Attribute9 to be sent in Assertion. Choices:
|
|
User-Friendly Name of attribute9 that needs to be sent in SAML Assertion |
|
Audience for which assertion sent by IdP is applicable. This is typically entity name or url that represents ServiceProvider |
|
This group will be part of AAA session’s internal group list. This will be helpful to admin in Nfactor flow to decide right AAA configuration for Relaying Party. In authentication policy AAA.USER.IS_MEMBER_OF(”<default_auth_group>”) is way to use this feature. |
|
Algorithm to be used to compute/verify digest for SAML transactions Choices:
|
|
Option to encrypt assertion when Citrix ADC IDP sends one. Choices:
|
|
Algorithm to be used to encrypt SAML assertion Choices:
|
|
Key transport algorithm to be used in encryption of SAML assertion Choices:
|
|
This element specifies the transport mechanism of saml logout messages. Choices:
|
|
The ID of the managed NetScaler instance to which NetScaler Console has to configure as a proxy server. Define only in case of an ADM service proxy call |
|
The IP of the managed NetScaler instance to which NetScaler Console has to configure as a proxy server. Define only in case of an ADM service proxy call |
|
The name of the managed NetScaler instance to which NetScaler Console has to configure as a proxy server. Define only in case of an ADM service proxy call |
|
The password of the managed NetScaler instance. Define only in case of an ADM service proxy call In Settings > Administration > System Configurations > Basic Settings, if you select Prompt Credentials for Instance Login, ensure to configure username and password of a managed instance. |
|
The username of the managed NetScaler instance. Define only in case of an ADM service proxy call In Settings > Administration > System Configurations > Basic Settings, if you select Prompt Credentials for Instance Login, ensure to configure username and password of a managed instance. |
|
Interval in minute for fetching metadata from specified metadata URL |
|
This URL is used for obtaining samlidp metadata |
|
Name for the new saml single sign-on profile. Must begin with an ASCII alphanumeric or underscore (_) character, and must contain only ASCII alphanumeric, underscore, hash (#), period (.), space, colon (:), at (@), equals (=), and hyphen (-) characters. Cannot be changed after an action is created. The following requirement applies only to the Citrix ADC CLI: If the name includes one or more spaces, enclose the name in double or single quotation marks (for example, “my action” or ‘my action’). |
|
Expression that will be evaluated to obtain NameIdentifier to be sent in assertion |
|
Format of Name Identifier sent in Assertion. Choices:
|
|
The IP address of the NetScaler ADC appliance acting as a proxy server. Define only in case of an ADM service proxy call Choices:
|
|
The authentication token provided by a login operation. |
|
The password with which to authenticate to the NetScaler ADC node. |
|
Which protocol to use when accessing the nitro API objects. Choices:
|
|
The username with which to authenticate to the NetScaler ADC node. |
|
The ip address of the NetScaler ADC appliance where the nitro API calls will be made. The port can be specified with the colon (:). E.g. 192.168.1.1:555. |
|
Option to Reject unsigned SAML Requests. Choices:
|
|
This element specifies the transport mechanism of saml messages. Choices:
|
|
Name of the certificate used to sign the SAMLResposne that is sent to Relying Party or Service Provider after successful authentication |
|
The name to be used in requests sent from Citrix ADC to IdP to uniquely identify Citrix ADC. |
|
version of the certificate in signature service used to sign the SAMLResposne that is sent to Relying Party or Service Provider after successful authentication |
|
Name of the SSL certificate of SAML Relying Party. This certificate is used to verify signature of the incoming AuthnRequest from a Relying Party or Service Provider |
|
version of the certificate in signature service used to verify the signature of the incoming AuthnRequest from a Relying Party or Service Provider |
|
If The module will not save the configuration on the NetScaler ADC node if it made no changes. Choices:
|
|
Option to send password in assertion. Choices:
|
|
Unique identifier of the Service Provider that sends SAML Request. Citrix ADC will ensure that the Issuer of the SAML Request matches this URI. In case of SP initiated sign-in scenarios, this value must be same as samlIssuerName configured in samlAction. |
|
Option to sign portions of assertion when Citrix ADC IDP sends one. Based on the user selection, either Assertion or Response or Both or none can be signed Choices:
|
|
Algorithm to be used to sign/verify SAML transactions Choices:
|
|
Name of the service in cloud used to sign the data |
|
This option specifies the number of minutes on either side of current time that the assertion would be valid. For example, if skewTime is 10, then assertion would be valid from (current time - 10) min to (current time + 10) min, ie 20min in all. |
|
Endpoint on the ServiceProvider (SP) to which logout messages are to be sent |
|
The state of the resource being configured by the module on the NetScaler ADC node. When When When Choices:
|
|
If Choices:
|
Notes
Note
For more information on using Ansible to manage NetScaler ADC Network devices see https://www.ansible.com/integrations/networks/citrixadc.
Examples
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
Indicates if any change is made by the module Returned: always Sample: |
|
Dictionary of before and after changes Returned: always Sample: |
|
List of differences between the actual configured object and the configuration specified in the module Returned: when changed Sample: |
|
Indicates if the module failed or not Returned: always Sample: |
|
list of logged messages by the module Returned: always Sample: |