[{"label":"Latest (2.0.1)","version":"latest"}]
telco-cloud-service-assurance

Get User Federation

Description

Retrieve the details of requested user federation.

Request

Request

URL

URL


get
https://{api_host}tcsa.host.com/tcsa/api/auth-management/v1/user-federations/{id}
Copy

Path Parameters

Path Parameters

string
id Required

Unique id of user-federation configuration.


Authentication

Authentication

This operation uses the following authentication methods.

Response

Response

Response Body

Response Body

200 OK

Returns UserFederation of type application/json
{
    "bind_dn": "ou=users",
    "bind_type": "simple",
    "connection_url": "http://<ip:port>",
    "edit_mode": "READ_ONLY",
    "enabled": true,
    "id": "c3046544-3dd4-4cc4-b3bf-0383088dd99f",
    "import_enabled": true,
    "name": "my-ldap-config",
    "priority": 1,
    "rdn_ldap_attribute": "uid",
    "sync_registration": false,
    "user_object_classes": "inetOrgPerson, organizationalPerson",
    "username_ldap_attribute": "cn",
    "users_dn": "ou=users,dc=tco,dc=com",
    "uuid_ldap_attribute": "uid",
    "vendor": "AD"
}
string
rdn_ldap_attribute Required

The name of attribute which is used as RDN(top attribute) of typical user DN. Usually its same as LDAP Username attribute, however its not required. For example for Active directory its common to use ‘cn’ as RDN attribute when username attribute might be ‘sAMAccountName’.


string
bind_credential Required

Password of LDAP admin.


string
bind_dn Required

DN of ldap admin which will be used by Keycloak to access LDAP server.


string
uuid_ldap_attribute Required

Name of the LDAP attribute which is used as unique object identifier for objects in LDAP.


string
connection_url Required

Connection url to your ldap server.


string
users_dn Required

Full DN of LDAP tree where your users are.


string
username_ldap_attribute Required

Name of LDAP attribute which is mapped as keycloak user name. For many LDAP server vendor it can be uid. For active directory it can be sAMAccountName" or cn. The attribute should be filed for all user records you want to import from LDAP to keycloak.


string
id Required

The id of user-federation configuration.


string
user_object_classes Required

All values of LDAP Object class attribute for users in LDAP divided by comma.


mapper Required

The request body contains parameter to map between Keycloak and Ldap.


string
vendor Required

LDAP vendor (provider). For Active Directory use ‘AD’ and for ‘Redhat directory server’ use ‘rhds’.


integer
priority Optional

Priority of provider when doing a user lookup. Lower first.


string
name Optional

Name of the user-federation configuration


boolean
sync_registration Optional

Should newly created user will be created with LDAP store. Priority effect which provider is chosen to sync new user. The setting is applied only for WRITABLE edit mode.


boolean
import_enabled Optional

If true, users will imported into keycloak DB and configured by the sync policies. The values could be “true” or “false”. The default is “true”


boolean
enabled Optional

If provider is disabled, it will not be considered for queries and imported users will be disabled and read-only until the provider is enabled again. The values could be “true” or “false”. The default is “true”


string
edit_mode Optional

There are 3 possible values, READ_ONLY,WRITABLE and UNSYNCED. READ_ONLY is read-only ldap store. WRITABLE means data will be synced back to the LDAP on demand and UNSYNCED means user data will be imported but not synced back to LDAP. DEFAULT is “READ_ONLY”.


string
bind_type Optional

Type of Authentication method used during LDAP bind operation.Supported values are ‘simple’ and ’none’. Default is ‘simple’


advanced Optional

The request body contains advanced parameter to configure user preference.

Errors

Errors

400

Invalid Request sent by the user


401

User authentication failed


403

Access to the requested resource/operation is forbidden


404

Cannot find requested resource


500

Internal server error

Code Samples

Code Samples

cURL Command

curl https://{api_host}tcsa.host.com/tcsa/api/auth-management/v1/user-federations/{id}


[{"label":"Latest (2.0.1)","version":"latest"}]
telco-cloud-service-assurance
Feedback

Was this page helpful?