Authorization
Descope Project ID and Management Key AuthorizationBearer <token>
Project ID:Management Key as bearer token.
In: header
Query Parameters
id?string
Load Application by ID within a project
This endpoint returns details of a specific Application within your Descope project.
See Also
- Review our documentation around Applications within Descope.
curl -X GET "https://api.descope.com/v1/mgmt/sso/idp/app/load"{ "app": { "id": "string", "name": "string", "description": "string", "enabled": true, "logo": "string", "appType": "string", "samlSettings": { "loginPageUrl": "string", "idpCert": "string", "useMetadataInfo": true, "metadataUrl": "string", "entityId": "string", "acsUrl": "string", "certificate": "string", "attributeMapping": [ { "name": "string", "type": "string", "value": "string" } ], "groupsMapping": [ { "name": "string", "type": "string", "filterType": "string", "value": "string", "roles": [ { "id": "string", "name": "string" } ] } ], "idpMetadataUrl": "string", "idpEntityId": "string", "idpSsoUrl": "string", "acsAllowedCallbacks": [ "string" ], "subjectNameIdType": "string", "subjectNameIdFormat": "string", "defaultRelayState": "string", "idpInitiatedUrl": "string", "forceAuthentication": true, "idpLogoutUrl": "string", "logoutRedirectUrl": "string", "errorRedirectURL": "string", "defaultSignatureAlgorithm": "string" }, "oidcSettings": { "loginPageUrl": "string", "issuer": "string", "discoveryUrl": "string", "claims": [ "string" ], "forceAuthentication": true, "jwtBearerSettings": { "issuers": { "property1": { "jwksUri": "string", "signAlgorithm": "string", "userInfoUri": "string", "externalIdFieldName": "string" }, "property2": { "jwksUri": "string", "signAlgorithm": "string", "userInfoUri": "string", "externalIdFieldName": "string" } }, "jwtBearerGrantTypeAudienceToUse": "string", "jwtBearerGrantTypeScopeToUse": "string", "jwtBearerGrantTypeCustomClaimsToUse": "string" }, "backChannelLogoutUrl": "string", "customIdpInitiatedLoginPageUrl": "string" }, "customSettings": { "loginPageUrl": "string" }, "wsfedSettings": { "loginPageUrl": "string", "realm": "string", "replyUrl": "string", "attributeMapping": [ { "name": "string", "type": "string", "value": "string" } ], "groupsMapping": [ { "name": "string", "type": "string", "filterType": "string", "value": "string", "roles": [ { "id": "string", "name": "string" } ] } ], "forceAuthentication": true, "logoutRedirectUrl": "string", "errorRedirectURL": "string", "idpCert": "string", "idpInitiatedUrl": "string", "idpMetadataUrl": "string", "idpEntityId": "string", "idpSsoUrl": "string" } }}export interface Response {app?: SSOApplication}export interface SSOApplication {id?: string/** * int64 version - excluded * int64 createdTime - excluded * string projectId - copied */name?: stringdescription?: stringenabled?: booleanlogo?: stringappType?: stringsamlSettings?: SSOApplicationSAMLSettingsoidcSettings?: SSOApplicationOIDCSettingscustomSettings?: SSOApplicationCustomSettingswsfedSettings?: SSOApplicationWSFedSettings}export interface SSOApplicationSAMLSettings {loginPageUrl?: stringidpCert?: stringuseMetadataInfo?: booleanmetadataUrl?: stringentityId?: stringacsUrl?: stringcertificate?: stringattributeMapping?: {name?: stringtype?: stringvalue?: string}[]groupsMapping?: {name?: stringtype?: stringfilterType?: stringvalue?: stringroles?: SAMLIDPRoleGroupMappingInfo[]}[]idpMetadataUrl?: stringidpEntityId?: stringidpSsoUrl?: stringacsAllowedCallbacks?: string[]subjectNameIdType?: stringsubjectNameIdFormat?: stringdefaultRelayState?: stringidpInitiatedUrl?: stringforceAuthentication?: booleanidpLogoutUrl?: stringlogoutRedirectUrl?: stringerrorRedirectURL?: stringdefaultSignatureAlgorithm?: string}export interface SAMLIDPRoleGroupMappingInfo {id?: stringname?: string}export interface SSOApplicationOIDCSettings {loginPageUrl?: stringissuer?: stringdiscoveryUrl?: stringclaims?: string[]forceAuthentication?: booleanjwtBearerSettings?: {issuers?: {[k: string]: IssuerSettings}jwtBearerGrantTypeAudienceToUse?: stringjwtBearerGrantTypeScopeToUse?: stringjwtBearerGrantTypeCustomClaimsToUse?: string}backChannelLogoutUrl?: stringcustomIdpInitiatedLoginPageUrl?: string}export interface IssuerSettings {jwksUri?: stringsignAlgorithm?: stringuserInfoUri?: stringexternalIdFieldName?: string}export interface SSOApplicationCustomSettings {loginPageUrl?: string}export interface SSOApplicationWSFedSettings {loginPageUrl?: stringrealm?: stringreplyUrl?: stringattributeMapping?: {name?: stringtype?: stringvalue?: string}[]groupsMapping?: {name?: stringtype?: stringfilterType?: stringvalue?: stringroles?: SAMLIDPRoleGroupMappingInfo[]}[]forceAuthentication?: booleanlogoutRedirectUrl?: stringerrorRedirectURL?: stringidpCert?: stringidpInitiatedUrl?: stringidpMetadataUrl?: stringidpEntityId?: stringidpSsoUrl?: string} Was this helpful?
Application Management API Overview
Use the Descope REST API to manage Applications within Descope
Create OIDC Application POST
### Create OIDC Application within a project This endpoint creates an OIDC Application within your Descope project. ### See Also - Review our [documentation](/manage/idpapplications/) around Applications within Descope.