Show / Hide Table of Contents

IdentityProvider.ReadWrite.Alll

Graph Methods

Type: A = Application Permission, D = Delegate Permission

Ver Type Method
V1 A POST /directory/federationConfigurations/{samlOrWsFedExternalDomainFederation ID}/microsoft.graph.samlOrWsFedExternalDomainFederation/domains

Application Permission

Id
Display String
Description

Resources

entity

Property Type Description
id String The unique idenfier for an entity. Read-only.

externalDomainName

Property Type Description
id String Domain name of the external organization that the Azure AD tenant is federating with. Inherited from entity.

samlOrWsFedExternalDomainFederation

Property Type Description
displayName String The display name of the SAML or WS-Fed based IdP. Inherited from identityProviderBase.
id String The identifier of the identity provider. Inherited from entity.
issuerUri String Issuer URI of the federation server. Inherited from samlOrWsFedProvider.
metadataExchangeUri String URI of the metadata exchange endpoint used for authentication from rich client applications. Inherited from samlOrWsFedProvider.
passiveSignInUri String URI that web-based clients are directed to when signing in to Azure AD services. Inherited from samlOrWsFedProvider.
preferredAuthenticationProtocol authenticationProtocol Preferred authentication protocol. The possible values are: wsFed, saml, unknownFutureValue. Inherited from samlOrWsFedProvider.
signingCertificate String Current certificate used to sign tokens passed to the Microsoft identity platform. The certificate is formatted as a Base64 encoded string of the public portion of the federated IdP's token signing certificate and must be compatible with the X509Certificate2 class.

This property is used in the following scenarios:
  • if a rollover is required outside of the autorollover update
  • a new federation service is being set up
  • if the new token signing certificate isn't present in the federation properties after the federation service certificate has been updated.


Azure AD updates certificates via an autorollover process in which it attempts to retrieve a new certificate from the federation service metadata, 30 days before expiry of the current certificate. If a new certificate isn't available, Azure AD monitors the metadata daily and will update the federation settings for the domain when a new certificate is available.

Inherited from samlOrWsFedProvider.
In This Article
Back to top Created by merill | Submit feedback