Return All Identity Providers in One Federation
Returns all identity providers with the provided protocol and type in the specified federation. If no protocol is specified, only SAML identity providers will be returned. If no idpType is specified, only WORKFORCE identity providers will be returned. To use this resource, the requesting Service Account or API Key must have the Organization Owner role in one of the connected organizations.
Path parameters
-
Unique 24-hexadecimal digit string that identifies your federation.
Format should match the following pattern:
^([a-f0-9]{24})$
.
Query parameters
-
Flag that indicates whether Application wraps the response in an
envelope
JSON object. Some API clients cannot access the HTTP response headers or status code. To remediate this, set envelope=true in the query. Endpoints that return a list of results use the results object as an envelope. Application adds the status parameter to the response body.Default value is
false
. -
Number of items that the response returns per page.
Minimum value is
1
, maximum value is500
. Default value is100
. -
Number of the page that displays the current set of the total objects that the response returns.
Minimum value is
1
. Default value is1
. -
The protocols of the target identity providers.
Values are
SAML
orOIDC
. Default value isSAML
. -
The types of the target identity providers.
Values are
WORKFORCE
orWORKLOAD
. Default value isWORKFORCE
.
curl \ --request GET 'https://cloud.mongodb.com/api/atlas/v1.0/federationSettings/55fa922fb343282757d9554e/identityProviders' \ --header "Authorization: Bearer $ACCESS_TOKEN"
{ "links": [ { "href": "https://cloud.mongodb.com/api/atlas", "rel": "self" } ], "results": [ { "associatedOrgs": [ { "dataAccessIdentityProviderIds": [ "string" ], "domainAllowList": [ "string" ], "domainRestrictionEnabled": true, "identityProviderId": "string", "orgId": "32b6e34b3d91647abb20e7b8", "postAuthRoleGrants": [ "ORG_OWNER" ], "roleMappings": [ { "externalGroupName": "string", "id": "32b6e34b3d91647abb20e7b8", "roleAssignments": [ { "groupId": "32b6e34b3d91647abb20e7b8", "orgId": "32b6e34b3d91647abb20e7b8", "role": "ORG_OWNER" } ] } ], "userConflicts": [ { "emailAddress": "hello@example.com", "federationSettingsId": "32b6e34b3d91647abb20e7b8", "firstName": "string", "lastName": "string", "userId": "32b6e34b3d91647abb20e7b8" } ] } ], "createdAt": "2025-05-04T09:42:00Z", "description": "string", "displayName": "string", "id": "32b6e34b3d91647abb20e7b8", "idpType": "WORKFORCE", "issuerUri": "string", "oktaIdpId": "string", "protocol": "SAML", "updatedAt": "2025-05-04T09:42:00Z", "acsUrl": "string", "associatedDomains": [ "string" ], "audienceUri": "string", "pemFileInfo": { "certificates": [ { "notAfter": "2025-05-04T09:42:00Z", "notBefore": "2025-05-04T09:42:00Z" } ], "fileName": "string" }, "requestBinding": "HTTP-POST", "responseSignatureAlgorithm": "SHA-1", "slug": "string", "ssoDebugEnabled": true, "ssoUrl": "string", "status": "ACTIVE" } ], "totalCount": 42 }
{ "error": 400, "detail": "(This is just an example, the exception may not be related to this endpoint) No provider AWS exists.", "reason": "Bad Request", "errorCode": "VALIDATION_ERROR" }
{ "error": 401, "detail": "(This is just an example, the exception may not be related to this endpoint)", "reason": "Unauthorized", "errorCode": "NOT_ORG_GROUP_CREATOR" }
{ "error": 403, "detail": "(This is just an example, the exception may not be related to this endpoint)", "reason": "Forbidden", "errorCode": "CANNOT_CHANGE_GROUP_NAME" }
{ "error": 404, "detail": "(This is just an example, the exception may not be related to this endpoint) Cannot find resource AWS", "reason": "Not Found", "errorCode": "RESOURCE_NOT_FOUND" }
{ "error": 500, "detail": "(This is just an example, the exception may not be related to this endpoint)", "reason": "Internal Server Error", "errorCode": "UNEXPECTED_ERROR" }