API Stability Long-Term

The updateSamlIdentityProvider() GraphQL mutation is used to update information related to an SAML identity provider in LogScale.

For more information on SAML, see the Configuration & Authentication with SAML documentation page. You may also want to look at Authentication & Identity Providers for related information.

Syntax

Below is the syntax for the updateSamlIdentityProvider() mutation field:

graphql
updateSamlIdentityProvider(
     id: string!
     name: string!
     signOnUrl: string!
     idpCertificateInBase64: string!
     idpEntityId: string!
     groupMembershipAttribute: string
     userAttribute: string
     enableDebug: boolean,
     adminAttribute: string,
     defaultIdp: boolean,
     lazyCreateUsers: boolean,
     alternativeIdpCertificateInBase64: string
   ): SamlIdentityProvider!

Below is an example of how this mutation field might be used:

Raw
graphql
mutation {
  updateSamlIdentityProvider(
      id: "abc123",
      name: "Samuel-IDP",
      signOnUrl: "https://my.samlidp.com",
      idpCertificateInBase64: "12345678",
      idpEntityId: "abc123",
      domains: ["humio"]
  )
  { id }
}
Mac OS or Linux (curl)
shell
curl -v -X POST $YOUR_LOGSCALE_URL/graphql \
    -H "Authorization: Bearer $TOKEN" \
    -H "Content-Type: application/json" \
    -d @- << EOF
{"query" : "mutation {
  updateSamlIdentityProvider(
      id: \"abc123\",
      name: \"Samuel-IDP\",
      signOnUrl: \"https://my.samlidp.com\",
      idpCertificateInBase64: \"12345678\",
      idpEntityId: \"abc123\",
      domains: [\"humio\"]
  )
  { id }
}"
}
EOF
Mac OS or Linux (curl) One-line
shell
curl -v -X POST $YOUR_LOGSCALE_URL/graphql \
    -H "Authorization: Bearer $TOKEN" \
    -H "Content-Type: application/json" \
    -d @- << EOF
{"query" : "mutation {
  updateSamlIdentityProvider(
      id: \"abc123\",
      name: \"Samuel-IDP\",
      signOnUrl: \"https://my.samlidp.com\",
      idpCertificateInBase64: \"12345678\",
      idpEntityId: \"abc123\",
      domains: [\"humio\"]
  )
  { id }
}"
}
EOF
Windows Cmd and curl
shell
curl -v -X POST $YOUR_LOGSCALE_URL/graphql ^
    -H "Authorization: Bearer $TOKEN" ^
    -H "Content-Type: application/json" ^
    -d @'{"query" : "mutation { ^
  updateSamlIdentityProvider( ^
      id: \"abc123\", ^
      name: \"Samuel-IDP\", ^
      signOnUrl: \"https://my.samlidp.com\", ^
      idpCertificateInBase64: \"12345678\", ^
      idpEntityId: \"abc123\", ^
      domains: [\"humio\"] ^
  ) ^
  { id } ^
}" ^
} '
Windows Powershell and curl
powershell
curl.exe -X POST 
    -H "Authorization: Bearer $TOKEN"
    -H "Content-Type: application/json"
    -d '{"query" : "mutation {
  updateSamlIdentityProvider(
      id: \"abc123\",
      name: \"Samuel-IDP\",
      signOnUrl: \"https://my.samlidp.com\",
      idpCertificateInBase64: \"12345678\",
      idpEntityId: \"abc123\",
      domains: [\"humio\"]
  )
  { id }
}"
}'
    "$YOUR_LOGSCALE_URL/graphql"
Perl
perl
#!/usr/bin/perl

use HTTP::Request;
use LWP;

my $INGEST_TOKEN = "TOKEN";

my $uri = '$YOUR_LOGSCALE_URL/graphql';

my $json = '{"query" : "mutation {
  updateSamlIdentityProvider(
      id: \"abc123\",
      name: \"Samuel-IDP\",
      signOnUrl: \"https://my.samlidp.com\",
      idpCertificateInBase64: \"12345678\",
      idpEntityId: \"abc123\",
      domains: [\"humio\"]
  )
  { id }
}"
}';
my $req = HTTP::Request->new("POST", $uri );

$req->header("Authorization" => "Bearer $TOKEN");
$req->header("Content-Type" => "application/json");

$req->content( $json );

my $lwp = LWP::UserAgent->new;

my $result = $lwp->request( $req );

print $result->{"_content"},"\n";
Python
python
#! /usr/local/bin/python3

import requests

url = '$YOUR_LOGSCALE_URL/graphql'
mydata = r'''{"query" : "mutation {
  updateSamlIdentityProvider(
      id: \"abc123\",
      name: \"Samuel-IDP\",
      signOnUrl: \"https://my.samlidp.com\",
      idpCertificateInBase64: \"12345678\",
      idpEntityId: \"abc123\",
      domains: [\"humio\"]
  )
  { id }
}"
}'''

resp = requests.post(url,
                     data = mydata,
                     headers = {
   "Authorization" : "Bearer $TOKEN",
   "Content-Type" : "application/json"
}
)

print(resp.text)
Node.js
javascript
const https = require('https');

const data = JSON.stringify(
    {"query" : "mutation {
  updateSamlIdentityProvider(
      id: \"abc123\",
      name: \"Samuel-IDP\",
      signOnUrl: \"https://my.samlidp.com\",
      idpCertificateInBase64: \"12345678\",
      idpEntityId: \"abc123\",
      domains: [\"humio\"]
  )
  { id }
}"
}
);


const options = {
  hostname: '$YOUR_LOGSCALE_URL/graphql',
  path: '/graphql',
  port: 443,
  method: 'POST',
  headers: {
    'Content-Type': 'application/json',
    'Content-Length': data.length,
    Authorization: 'BEARER ' + process.env.TOKEN,
    'User-Agent': 'Node',
  },
};

const req = https.request(options, (res) => {
  let data = '';
  console.log(`statusCode: ${res.statusCode}`);

  res.on('data', (d) => {
    data += d;
  });
  res.on('end', () => {
    console.log(JSON.parse(data).data);
  });
});

req.on('error', (error) => {
  console.error(error);
});

req.write(data);
req.end();
Example Responses
Success (HTTP Response Code 200 OK)
json
{
  "data": {
    "updateSamlIdentityProvider": {
      "id": "abc123"
    }
  }
}

Returned Datatypes

The returned datatype SamlIdentityProvider has several parameters. Below is a list of them along with a description of each:

Table: SamlIdentityProvider

ParameterTypeRequiredDefaultStabilityDescription
Some arguments may be required, as indicated in the Required column. For some fields, this column indicates that a result will always be returned for this column.
Table last updated: Mar 17, 2025
adminAttributestring  Long-TermThis field is for internal use only by LogScale.
adminAttributeMatchstring  Long-TermThis field is for internal use only by LogScale.
alternativeIdpCertificateInBase64string  Long-TermAn alternative IdP certificate using Base64 encoding.
authenticationMethodAuthenticationMethodAuthyes Long-TermThe authentication method used. See AuthenticationMethodAuth.
debugbooleanyes Long-TermWhether debugging is enabled.
defaultIdpbooleanyes Long-TermWhether the identity service provider is the default.
domains[string]yes Long-TermThe domains of the SAML identity provider.
groupMembershipAttributestring  Long-TermThe saml attribute used to extract groups from when receiving the SamlResponse from the IDP. The groups from the response will be used to synchronize the membership of groups in LogScale. The group name and external provider name of the group are matched in LogScale.
humioManagedbooleanyes Long-TermWhere SAML authentication is managed by LogScale.
idstringyes Long-TermThe unique identifier for the SAML installation.
idpCertificateInBase64stringyes Long-TermThe identity provider's certificated converted to Base64.
idpEntityIdstringyes Long-TermThe unique identifier of the IDP entity.
lazyCreateUsersbooleanyes Long-TermWhether to wait to create users until necessary.
namestringyes Long-TermThe name of the SAML identity provider.
signOnUrlstringyes Long-TermThe URL of where the sign on page is located.
userAttributestring  Long-TermThis is the saml attribute from which to extract username when receiving the SamlResponse from the IDP. If not specified, the default saml:NameID will be used.