/create-auth-method-ldap

Log in to see full request history
timestatususer agent
Retrieving recent requests…
LoadingLoading…
Body Params
int64
Defaults to 0

Access expiration date in Unix timestamp (select 0 for access without
expiry date)

array of strings

Subclaims to include in audit logs, e.g "--audit-logs-claims email --audit-logs-claims username"

audit-logs-claims
array of strings

A CIDR whitelist with the IPs that the access is restricted to

bound-ips
string

Protection from accidental deletion of this object [true/false]

string

Auth Method description

boolean

if true: enforce role-association must include sub claims

string
Defaults to true

Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided [true/false]

array of strings

A CIDR whitelist with the GW IPs that the access is restricted to

gw-bound-ips
boolean
Defaults to false

Set output format to JSON

int64
Defaults to 0

Jwt TTL

string
required

Auth Method name

array of strings

Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]

product-type
string

A public key generated for LDAP authentication method on Akeyless in base64 or PEM format
[RSA2048]

string

Authentication token (see /auth and /configure)

string

The universal identity token, Required only for universal_identity authentication

string
Defaults to users

A unique identifier (ID) value should be configured for OAuth2,
LDAP and SAML authentication method types and is usually a value such
as the email, username, or upn for example.
Whenever a user logs in with a token, these authentication types issue
a "sub claim" that contains details uniquely identifying that user.
This sub claim includes a key containing the ID value that you
configured, and is used to distinguish between different users from
within the same organization.

Responses

Language
Click Try It! to start a request and see the response here! Or choose an example:
application/json