feat: Add Federated Settings Identity Provider Resource#1540
Merged
rakhul-mongo merged 5 commits intomasterfrom Jan 29, 2026
Merged
feat: Add Federated Settings Identity Provider Resource#1540rakhul-mongo merged 5 commits intomasterfrom
rakhul-mongo merged 5 commits intomasterfrom
Conversation
0ba7348 to
05ad5dd
Compare
oarbusi
reviewed
Jan 28, 2026
oarbusi
reviewed
Jan 28, 2026
oarbusi
reviewed
Jan 28, 2026
oarbusi
reviewed
Jan 28, 2026
1c69b9c to
3a077bb
Compare
oarbusi
approved these changes
Jan 29, 2026
Collaborator
oarbusi
left a comment
There was a problem hiding this comment.
LGTM, thanks for addressing the comments. Since this is a new resource, 1.0.0 version of it should be released
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Proposed changes
Added new resource
MongoDB::Atlas::FederatedSettingsIdentityProviderfor managing Atlas Federated Authentication Identity Providers (OIDC and SAML).Resource Configuration
Required Properties:
FederationSettingsId: Unique 24-hexadecimal digit string that identifies your federationName: Human-readable label (display name) of the identity providerIssuerUri: Issuer URI of the identity providerOptional Properties:
Protocol: Identity provider protocol (OIDC or SAML) - automatically set to "OIDC" for create operationsIdpType: Identity provider type (WORKFORCE or WORKLOAD)Audience: OIDC audience claim valueClientId: OIDC client ID (optional for WORKLOAD providers like GitHub Actions)GroupsClaim: OIDC groups claimUserClaim: OIDC user claimRequestedScopes: OIDC requested scopes (not needed for WORKLOAD providers)Description: Description of the identity providerAuthorizationType: OIDC authorization typeAssociatedDomains: List of domains associated with the identity providerSsoUrl: SSO URL (SAML only)SsoDebugEnabled: Flag to enable SSO debug (SAML only)RequestBinding: SAML request bindingResponseSignatureAlgorithm: SAML response signature algorithmStatus: Identity provider statusProfile: Secret Manager Profile containing Atlas API keys (default: "default")Read-Only Properties:
IdpId: Unique identifier of the identity providerOktaIdpId: Legacy identity provider identifier (not returned for WORKLOAD providers)Note: CREATE operation only supports OIDC protocol. SAML identity providers must be imported.
FederationSettingsIdandProfileare create-only properties.Testing
CFN Contract Tests:

Stack Testing:

Jira ticket: CLOUDP-369801
Type of change:
Manual QA performed:
Required Checklist:
make fmtand formatted my code