GET getSamlProvider
{{baseUrl}}/saml-provider
Examples
REQUEST

CURL *hnd = curl_easy_init();

curl_easy_setopt(hnd, CURLOPT_CUSTOMREQUEST, "GET");
curl_easy_setopt(hnd, CURLOPT_URL, "{{baseUrl}}/saml-provider");

CURLcode ret = curl_easy_perform(hnd);
(require '[clj-http.client :as client])

(client/get "{{baseUrl}}/saml-provider")
require "http/client"

url = "{{baseUrl}}/saml-provider"

response = HTTP::Client.get url
puts response.body
using System.Net.Http.Headers;
var client = new HttpClient();
var request = new HttpRequestMessage
{
    Method = HttpMethod.Get,
    RequestUri = new Uri("{{baseUrl}}/saml-provider"),
};
using (var response = await client.SendAsync(request))
{
    response.EnsureSuccessStatusCode();
    var body = await response.Content.ReadAsStringAsync();
    Console.WriteLine(body);
}
var client = new RestClient("{{baseUrl}}/saml-provider");
var request = new RestRequest("", Method.Get);
var response = client.Execute(request);
package main

import (
	"fmt"
	"net/http"
	"io"
)

func main() {

	url := "{{baseUrl}}/saml-provider"

	req, _ := http.NewRequest("GET", url, nil)

	res, _ := http.DefaultClient.Do(req)

	defer res.Body.Close()
	body, _ := io.ReadAll(res.Body)

	fmt.Println(res)
	fmt.Println(string(body))

}
GET /baseUrl/saml-provider HTTP/1.1
Host: example.com

AsyncHttpClient client = new DefaultAsyncHttpClient();
client.prepare("GET", "{{baseUrl}}/saml-provider")
  .execute()
  .toCompletableFuture()
  .thenAccept(System.out::println)
  .join();

client.close();
HttpRequest request = HttpRequest.newBuilder()
    .uri(URI.create("{{baseUrl}}/saml-provider"))
    .method("GET", HttpRequest.BodyPublishers.noBody())
    .build();
HttpResponse response = HttpClient.newHttpClient().send(request, HttpResponse.BodyHandlers.ofString());
System.out.println(response.body());
OkHttpClient client = new OkHttpClient();

Request request = new Request.Builder()
  .url("{{baseUrl}}/saml-provider")
  .get()
  .build();

Response response = client.newCall(request).execute();
HttpResponse response = Unirest.get("{{baseUrl}}/saml-provider")
  .asString();
const data = null;

const xhr = new XMLHttpRequest();
xhr.withCredentials = true;

xhr.addEventListener('readystatechange', function () {
  if (this.readyState === this.DONE) {
    console.log(this.responseText);
  }
});

xhr.open('GET', '{{baseUrl}}/saml-provider');

xhr.send(data);
import axios from 'axios';

const options = {method: 'GET', url: '{{baseUrl}}/saml-provider'};

try {
  const { data } = await axios.request(options);
  console.log(data);
} catch (error) {
  console.error(error);
}
const url = '{{baseUrl}}/saml-provider';
const options = {method: 'GET'};

try {
  const response = await fetch(url, options);
  const data = await response.json();
  console.log(data);
} catch (error) {
  console.error(error);
}
const settings = {
  async: true,
  crossDomain: true,
  url: '{{baseUrl}}/saml-provider',
  method: 'GET',
  headers: {}
};

$.ajax(settings).done(function (response) {
  console.log(response);
});
val client = OkHttpClient()

val request = Request.Builder()
  .url("{{baseUrl}}/saml-provider")
  .get()
  .build()

val response = client.newCall(request).execute()
const http = require('https');

const options = {
  method: 'GET',
  hostname: 'example.com',
  port: null,
  path: '/baseUrl/saml-provider',
  headers: {}
};

const req = http.request(options, function (res) {
  const chunks = [];

  res.on('data', function (chunk) {
    chunks.push(chunk);
  });

  res.on('end', function () {
    const body = Buffer.concat(chunks);
    console.log(body.toString());
  });
});

req.end();
const request = require('request');

const options = {method: 'GET', url: '{{baseUrl}}/saml-provider'};

request(options, function (error, response, body) {
  if (error) throw new Error(error);

  console.log(body);
});
const unirest = require('unirest');

const req = unirest('GET', '{{baseUrl}}/saml-provider');

req.end(function (res) {
  if (res.error) throw new Error(res.error);

  console.log(res.body);
});
const axios = require('axios').default;

const options = {method: 'GET', url: '{{baseUrl}}/saml-provider'};

try {
  const { data } = await axios.request(options);
  console.log(data);
} catch (error) {
  console.error(error);
}
const fetch = require('node-fetch');

const url = '{{baseUrl}}/saml-provider';
const options = {method: 'GET'};

try {
  const response = await fetch(url, options);
  const data = await response.json();
  console.log(data);
} catch (error) {
  console.error(error);
}
#import 

NSMutableURLRequest *request = [NSMutableURLRequest requestWithURL:[NSURL URLWithString:@"{{baseUrl}}/saml-provider"]
                                                       cachePolicy:NSURLRequestUseProtocolCachePolicy
                                                   timeoutInterval:10.0];
[request setHTTPMethod:@"GET"];

NSURLSession *session = [NSURLSession sharedSession];
NSURLSessionDataTask *dataTask = [session dataTaskWithRequest:request
                                            completionHandler:^(NSData *data, NSURLResponse *response, NSError *error) {
                                                if (error) {
                                                    NSLog(@"%@", error);
                                                } else {
                                                    NSHTTPURLResponse *httpResponse = (NSHTTPURLResponse *) response;
                                                    NSLog(@"%@", httpResponse);
                                                }
                                            }];
[dataTask resume];
open Cohttp_lwt_unix
open Cohttp
open Lwt

let uri = Uri.of_string "{{baseUrl}}/saml-provider" in

Client.call `GET uri
>>= fun (res, body_stream) ->
  (* Do stuff with the result *)
 "{{baseUrl}}/saml-provider",
  CURLOPT_RETURNTRANSFER => true,
  CURLOPT_ENCODING => "",
  CURLOPT_MAXREDIRS => 10,
  CURLOPT_TIMEOUT => 30,
  CURLOPT_HTTP_VERSION => CURL_HTTP_VERSION_1_1,
  CURLOPT_CUSTOMREQUEST => "GET",
]);

$response = curl_exec($curl);
$err = curl_error($curl);

curl_close($curl);

if ($err) {
  echo "cURL Error #:" . $err;
} else {
  echo $response;
}
request('GET', '{{baseUrl}}/saml-provider');

echo $response->getBody();
setUrl('{{baseUrl}}/saml-provider');
$request->setMethod(HTTP_METH_GET);

try {
  $response = $request->send();

  echo $response->getBody();
} catch (HttpException $ex) {
  echo $ex;
}
setRequestUrl('{{baseUrl}}/saml-provider');
$request->setRequestMethod('GET');
$client->enqueue($request)->send();
$response = $client->getResponse();

echo $response->getBody();
$response = Invoke-WebRequest -Uri '{{baseUrl}}/saml-provider' -Method GET 
$response = Invoke-RestMethod -Uri '{{baseUrl}}/saml-provider' -Method GET 
import http.client

conn = http.client.HTTPSConnection("example.com")

conn.request("GET", "/baseUrl/saml-provider")

res = conn.getresponse()
data = res.read()

print(data.decode("utf-8"))
import requests

url = "{{baseUrl}}/saml-provider"

response = requests.get(url)

print(response.json())
library(httr)

url <- "{{baseUrl}}/saml-provider"

response <- VERB("GET", url, content_type("application/octet-stream"))

content(response, "text")
require 'uri'
require 'net/http'

url = URI("{{baseUrl}}/saml-provider")

http = Net::HTTP.new(url.host, url.port)
http.use_ssl = true

request = Net::HTTP::Get.new(url)

response = http.request(request)
puts response.read_body
require 'faraday'

conn = Faraday.new(
  url: 'https://example.com',
)

response = conn.get('/baseUrl/saml-provider') do |req|
end

puts response.status
puts response.body
use reqwest;

#[tokio::main]
pub async fn main() {
    let url = "{{baseUrl}}/saml-provider";

    let client = reqwest::Client::new();
    let response = client.get(url)
        .send()
        .await;

    let results = response.unwrap()
        .json::()
        .await
        .unwrap();

    dbg!(results);
}
curl --request GET \
  --url {{baseUrl}}/saml-provider
http GET {{baseUrl}}/saml-provider
wget --quiet \
  --method GET \
  --output-document \
  - {{baseUrl}}/saml-provider
import Foundation

let request = NSMutableURLRequest(url: NSURL(string: "{{baseUrl}}/saml-provider")! as URL,
                                        cachePolicy: .useProtocolCachePolicy,
                                    timeoutInterval: 10.0)
request.httpMethod = "GET"

let session = URLSession.shared
let dataTask = session.dataTask(with: request as URLRequest, completionHandler: { (data, response, error) -> Void in
  if (error != nil) {
    print(error as Any)
  } else {
    let httpResponse = response as? HTTPURLResponse
    print(httpResponse)
  }
})

dataTask.resume()
PATCH patchSamlProvider
{{baseUrl}}/saml-provider
BODY json

{
  "enabled": false,
  "entityId": "",
  "idp": {
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  },
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": {
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  },
  "sslRequired": false
}
Examples
REQUEST

CURL *hnd = curl_easy_init();

curl_easy_setopt(hnd, CURLOPT_CUSTOMREQUEST, "PATCH");
curl_easy_setopt(hnd, CURLOPT_URL, "{{baseUrl}}/saml-provider");

struct curl_slist *headers = NULL;
headers = curl_slist_append(headers, "content-type: application/json");
curl_easy_setopt(hnd, CURLOPT_HTTPHEADER, headers);

curl_easy_setopt(hnd, CURLOPT_POSTFIELDS, "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}");

CURLcode ret = curl_easy_perform(hnd);
(require '[clj-http.client :as client])

(client/patch "{{baseUrl}}/saml-provider" {:content-type :json
                                                           :form-params {:enabled false
                                                                         :entityId ""
                                                                         :idp {:authnRequestSignatureRequired false
                                                                               :defaultAssertionLifetime 0
                                                                               :sessionMaximumAge 0
                                                                               :sessionTimeout 0}
                                                                         :keyStoreCredentialPassword ""
                                                                         :role ""
                                                                         :signMetadata false
                                                                         :sp {:allowShowingTheLoginPortlet false
                                                                              :assertionSignatureRequired false
                                                                              :clockSkew 0
                                                                              :keyStoreEncryptionCredentialPassword ""
                                                                              :ldapImportEnabled false
                                                                              :signAuthnRequest false}
                                                                         :sslRequired false}})
require "http/client"

url = "{{baseUrl}}/saml-provider"
headers = HTTP::Headers{
  "content-type" => "application/json"
}
reqBody = "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}"

response = HTTP::Client.patch url, headers: headers, body: reqBody
puts response.body
using System.Net.Http.Headers;
var client = new HttpClient();
var request = new HttpRequestMessage
{
    Method = HttpMethod.Patch,
    RequestUri = new Uri("{{baseUrl}}/saml-provider"),
    Content = new StringContent("{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}")
    {
        Headers =
        {
            ContentType = new MediaTypeHeaderValue("application/json")
        }
    }
};
using (var response = await client.SendAsync(request))
{
    response.EnsureSuccessStatusCode();
    var body = await response.Content.ReadAsStringAsync();
    Console.WriteLine(body);
}
var client = new RestClient("{{baseUrl}}/saml-provider");
var request = new RestRequest("", Method.Patch);
request.AddHeader("content-type", "application/json");
request.AddParameter("application/json", "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}", ParameterType.RequestBody);
var response = client.Execute(request);
package main

import (
	"fmt"
	"strings"
	"net/http"
	"io"
)

func main() {

	url := "{{baseUrl}}/saml-provider"

	payload := strings.NewReader("{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}")

	req, _ := http.NewRequest("PATCH", url, payload)

	req.Header.Add("content-type", "application/json")

	res, _ := http.DefaultClient.Do(req)

	defer res.Body.Close()
	body, _ := io.ReadAll(res.Body)

	fmt.Println(res)
	fmt.Println(string(body))

}
PATCH /baseUrl/saml-provider HTTP/1.1
Content-Type: application/json
Host: example.com
Content-Length: 514

{
  "enabled": false,
  "entityId": "",
  "idp": {
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  },
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": {
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  },
  "sslRequired": false
}
AsyncHttpClient client = new DefaultAsyncHttpClient();
client.prepare("PATCH", "{{baseUrl}}/saml-provider")
  .setHeader("content-type", "application/json")
  .setBody("{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}")
  .execute()
  .toCompletableFuture()
  .thenAccept(System.out::println)
  .join();

client.close();
HttpRequest request = HttpRequest.newBuilder()
    .uri(URI.create("{{baseUrl}}/saml-provider"))
    .header("content-type", "application/json")
    .method("PATCH", HttpRequest.BodyPublishers.ofString("{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}"))
    .build();
HttpResponse response = HttpClient.newHttpClient().send(request, HttpResponse.BodyHandlers.ofString());
System.out.println(response.body());
OkHttpClient client = new OkHttpClient();

MediaType mediaType = MediaType.parse("application/json");
RequestBody body = RequestBody.create(mediaType, "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}");
Request request = new Request.Builder()
  .url("{{baseUrl}}/saml-provider")
  .patch(body)
  .addHeader("content-type", "application/json")
  .build();

Response response = client.newCall(request).execute();
HttpResponse response = Unirest.patch("{{baseUrl}}/saml-provider")
  .header("content-type", "application/json")
  .body("{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}")
  .asString();
const data = JSON.stringify({
  enabled: false,
  entityId: '',
  idp: {
    authnRequestSignatureRequired: false,
    defaultAssertionLifetime: 0,
    sessionMaximumAge: 0,
    sessionTimeout: 0
  },
  keyStoreCredentialPassword: '',
  role: '',
  signMetadata: false,
  sp: {
    allowShowingTheLoginPortlet: false,
    assertionSignatureRequired: false,
    clockSkew: 0,
    keyStoreEncryptionCredentialPassword: '',
    ldapImportEnabled: false,
    signAuthnRequest: false
  },
  sslRequired: false
});

const xhr = new XMLHttpRequest();
xhr.withCredentials = true;

xhr.addEventListener('readystatechange', function () {
  if (this.readyState === this.DONE) {
    console.log(this.responseText);
  }
});

xhr.open('PATCH', '{{baseUrl}}/saml-provider');
xhr.setRequestHeader('content-type', 'application/json');

xhr.send(data);
import axios from 'axios';

const options = {
  method: 'PATCH',
  url: '{{baseUrl}}/saml-provider',
  headers: {'content-type': 'application/json'},
  data: {
    enabled: false,
    entityId: '',
    idp: {
      authnRequestSignatureRequired: false,
      defaultAssertionLifetime: 0,
      sessionMaximumAge: 0,
      sessionTimeout: 0
    },
    keyStoreCredentialPassword: '',
    role: '',
    signMetadata: false,
    sp: {
      allowShowingTheLoginPortlet: false,
      assertionSignatureRequired: false,
      clockSkew: 0,
      keyStoreEncryptionCredentialPassword: '',
      ldapImportEnabled: false,
      signAuthnRequest: false
    },
    sslRequired: false
  }
};

try {
  const { data } = await axios.request(options);
  console.log(data);
} catch (error) {
  console.error(error);
}
const url = '{{baseUrl}}/saml-provider';
const options = {
  method: 'PATCH',
  headers: {'content-type': 'application/json'},
  body: '{"enabled":false,"entityId":"","idp":{"authnRequestSignatureRequired":false,"defaultAssertionLifetime":0,"sessionMaximumAge":0,"sessionTimeout":0},"keyStoreCredentialPassword":"","role":"","signMetadata":false,"sp":{"allowShowingTheLoginPortlet":false,"assertionSignatureRequired":false,"clockSkew":0,"keyStoreEncryptionCredentialPassword":"","ldapImportEnabled":false,"signAuthnRequest":false},"sslRequired":false}'
};

try {
  const response = await fetch(url, options);
  const data = await response.json();
  console.log(data);
} catch (error) {
  console.error(error);
}
const settings = {
  async: true,
  crossDomain: true,
  url: '{{baseUrl}}/saml-provider',
  method: 'PATCH',
  headers: {
    'content-type': 'application/json'
  },
  processData: false,
  data: '{\n  "enabled": false,\n  "entityId": "",\n  "idp": {\n    "authnRequestSignatureRequired": false,\n    "defaultAssertionLifetime": 0,\n    "sessionMaximumAge": 0,\n    "sessionTimeout": 0\n  },\n  "keyStoreCredentialPassword": "",\n  "role": "",\n  "signMetadata": false,\n  "sp": {\n    "allowShowingTheLoginPortlet": false,\n    "assertionSignatureRequired": false,\n    "clockSkew": 0,\n    "keyStoreEncryptionCredentialPassword": "",\n    "ldapImportEnabled": false,\n    "signAuthnRequest": false\n  },\n  "sslRequired": false\n}'
};

$.ajax(settings).done(function (response) {
  console.log(response);
});
val client = OkHttpClient()

val mediaType = MediaType.parse("application/json")
val body = RequestBody.create(mediaType, "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}")
val request = Request.Builder()
  .url("{{baseUrl}}/saml-provider")
  .patch(body)
  .addHeader("content-type", "application/json")
  .build()

val response = client.newCall(request).execute()
const http = require('https');

const options = {
  method: 'PATCH',
  hostname: 'example.com',
  port: null,
  path: '/baseUrl/saml-provider',
  headers: {
    'content-type': 'application/json'
  }
};

const req = http.request(options, function (res) {
  const chunks = [];

  res.on('data', function (chunk) {
    chunks.push(chunk);
  });

  res.on('end', function () {
    const body = Buffer.concat(chunks);
    console.log(body.toString());
  });
});

req.write(JSON.stringify({
  enabled: false,
  entityId: '',
  idp: {
    authnRequestSignatureRequired: false,
    defaultAssertionLifetime: 0,
    sessionMaximumAge: 0,
    sessionTimeout: 0
  },
  keyStoreCredentialPassword: '',
  role: '',
  signMetadata: false,
  sp: {
    allowShowingTheLoginPortlet: false,
    assertionSignatureRequired: false,
    clockSkew: 0,
    keyStoreEncryptionCredentialPassword: '',
    ldapImportEnabled: false,
    signAuthnRequest: false
  },
  sslRequired: false
}));
req.end();
const request = require('request');

const options = {
  method: 'PATCH',
  url: '{{baseUrl}}/saml-provider',
  headers: {'content-type': 'application/json'},
  body: {
    enabled: false,
    entityId: '',
    idp: {
      authnRequestSignatureRequired: false,
      defaultAssertionLifetime: 0,
      sessionMaximumAge: 0,
      sessionTimeout: 0
    },
    keyStoreCredentialPassword: '',
    role: '',
    signMetadata: false,
    sp: {
      allowShowingTheLoginPortlet: false,
      assertionSignatureRequired: false,
      clockSkew: 0,
      keyStoreEncryptionCredentialPassword: '',
      ldapImportEnabled: false,
      signAuthnRequest: false
    },
    sslRequired: false
  },
  json: true
};

request(options, function (error, response, body) {
  if (error) throw new Error(error);

  console.log(body);
});
const unirest = require('unirest');

const req = unirest('PATCH', '{{baseUrl}}/saml-provider');

req.headers({
  'content-type': 'application/json'
});

req.type('json');
req.send({
  enabled: false,
  entityId: '',
  idp: {
    authnRequestSignatureRequired: false,
    defaultAssertionLifetime: 0,
    sessionMaximumAge: 0,
    sessionTimeout: 0
  },
  keyStoreCredentialPassword: '',
  role: '',
  signMetadata: false,
  sp: {
    allowShowingTheLoginPortlet: false,
    assertionSignatureRequired: false,
    clockSkew: 0,
    keyStoreEncryptionCredentialPassword: '',
    ldapImportEnabled: false,
    signAuthnRequest: false
  },
  sslRequired: false
});

req.end(function (res) {
  if (res.error) throw new Error(res.error);

  console.log(res.body);
});
const axios = require('axios').default;

const options = {
  method: 'PATCH',
  url: '{{baseUrl}}/saml-provider',
  headers: {'content-type': 'application/json'},
  data: {
    enabled: false,
    entityId: '',
    idp: {
      authnRequestSignatureRequired: false,
      defaultAssertionLifetime: 0,
      sessionMaximumAge: 0,
      sessionTimeout: 0
    },
    keyStoreCredentialPassword: '',
    role: '',
    signMetadata: false,
    sp: {
      allowShowingTheLoginPortlet: false,
      assertionSignatureRequired: false,
      clockSkew: 0,
      keyStoreEncryptionCredentialPassword: '',
      ldapImportEnabled: false,
      signAuthnRequest: false
    },
    sslRequired: false
  }
};

try {
  const { data } = await axios.request(options);
  console.log(data);
} catch (error) {
  console.error(error);
}
const fetch = require('node-fetch');

const url = '{{baseUrl}}/saml-provider';
const options = {
  method: 'PATCH',
  headers: {'content-type': 'application/json'},
  body: '{"enabled":false,"entityId":"","idp":{"authnRequestSignatureRequired":false,"defaultAssertionLifetime":0,"sessionMaximumAge":0,"sessionTimeout":0},"keyStoreCredentialPassword":"","role":"","signMetadata":false,"sp":{"allowShowingTheLoginPortlet":false,"assertionSignatureRequired":false,"clockSkew":0,"keyStoreEncryptionCredentialPassword":"","ldapImportEnabled":false,"signAuthnRequest":false},"sslRequired":false}'
};

try {
  const response = await fetch(url, options);
  const data = await response.json();
  console.log(data);
} catch (error) {
  console.error(error);
}
#import 

NSDictionary *headers = @{ @"content-type": @"application/json" };
NSDictionary *parameters = @{ @"enabled": @NO,
                              @"entityId": @"",
                              @"idp": @{ @"authnRequestSignatureRequired": @NO, @"defaultAssertionLifetime": @0, @"sessionMaximumAge": @0, @"sessionTimeout": @0 },
                              @"keyStoreCredentialPassword": @"",
                              @"role": @"",
                              @"signMetadata": @NO,
                              @"sp": @{ @"allowShowingTheLoginPortlet": @NO, @"assertionSignatureRequired": @NO, @"clockSkew": @0, @"keyStoreEncryptionCredentialPassword": @"", @"ldapImportEnabled": @NO, @"signAuthnRequest": @NO },
                              @"sslRequired": @NO };

NSData *postData = [NSJSONSerialization dataWithJSONObject:parameters options:0 error:nil];

NSMutableURLRequest *request = [NSMutableURLRequest requestWithURL:[NSURL URLWithString:@"{{baseUrl}}/saml-provider"]
                                                       cachePolicy:NSURLRequestUseProtocolCachePolicy
                                                   timeoutInterval:10.0];
[request setHTTPMethod:@"PATCH"];
[request setAllHTTPHeaderFields:headers];
[request setHTTPBody:postData];

NSURLSession *session = [NSURLSession sharedSession];
NSURLSessionDataTask *dataTask = [session dataTaskWithRequest:request
                                            completionHandler:^(NSData *data, NSURLResponse *response, NSError *error) {
                                                if (error) {
                                                    NSLog(@"%@", error);
                                                } else {
                                                    NSHTTPURLResponse *httpResponse = (NSHTTPURLResponse *) response;
                                                    NSLog(@"%@", httpResponse);
                                                }
                                            }];
[dataTask resume];
open Cohttp_lwt_unix
open Cohttp
open Lwt

let uri = Uri.of_string "{{baseUrl}}/saml-provider" in
let headers = Header.add (Header.init ()) "content-type" "application/json" in
let body = Cohttp_lwt_body.of_string "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}" in

Client.call ~headers ~body `PATCH uri
>>= fun (res, body_stream) ->
  (* Do stuff with the result *)
 "{{baseUrl}}/saml-provider",
  CURLOPT_RETURNTRANSFER => true,
  CURLOPT_ENCODING => "",
  CURLOPT_MAXREDIRS => 10,
  CURLOPT_TIMEOUT => 30,
  CURLOPT_HTTP_VERSION => CURL_HTTP_VERSION_1_1,
  CURLOPT_CUSTOMREQUEST => "PATCH",
  CURLOPT_POSTFIELDS => json_encode([
    'enabled' => null,
    'entityId' => '',
    'idp' => [
        'authnRequestSignatureRequired' => null,
        'defaultAssertionLifetime' => 0,
        'sessionMaximumAge' => 0,
        'sessionTimeout' => 0
    ],
    'keyStoreCredentialPassword' => '',
    'role' => '',
    'signMetadata' => null,
    'sp' => [
        'allowShowingTheLoginPortlet' => null,
        'assertionSignatureRequired' => null,
        'clockSkew' => 0,
        'keyStoreEncryptionCredentialPassword' => '',
        'ldapImportEnabled' => null,
        'signAuthnRequest' => null
    ],
    'sslRequired' => null
  ]),
  CURLOPT_HTTPHEADER => [
    "content-type: application/json"
  ],
]);

$response = curl_exec($curl);
$err = curl_error($curl);

curl_close($curl);

if ($err) {
  echo "cURL Error #:" . $err;
} else {
  echo $response;
}
request('PATCH', '{{baseUrl}}/saml-provider', [
  'body' => '{
  "enabled": false,
  "entityId": "",
  "idp": {
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  },
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": {
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  },
  "sslRequired": false
}',
  'headers' => [
    'content-type' => 'application/json',
  ],
]);

echo $response->getBody();
setUrl('{{baseUrl}}/saml-provider');
$request->setMethod(HttpRequest::HTTP_METH_PATCH);

$request->setHeaders([
  'content-type' => 'application/json'
]);

$request->setContentType('application/json');
$request->setBody(json_encode([
  'enabled' => null,
  'entityId' => '',
  'idp' => [
    'authnRequestSignatureRequired' => null,
    'defaultAssertionLifetime' => 0,
    'sessionMaximumAge' => 0,
    'sessionTimeout' => 0
  ],
  'keyStoreCredentialPassword' => '',
  'role' => '',
  'signMetadata' => null,
  'sp' => [
    'allowShowingTheLoginPortlet' => null,
    'assertionSignatureRequired' => null,
    'clockSkew' => 0,
    'keyStoreEncryptionCredentialPassword' => '',
    'ldapImportEnabled' => null,
    'signAuthnRequest' => null
  ],
  'sslRequired' => null
]));

try {
  $response = $request->send();

  echo $response->getBody();
} catch (HttpException $ex) {
  echo $ex;
}
append(json_encode([
  'enabled' => null,
  'entityId' => '',
  'idp' => [
    'authnRequestSignatureRequired' => null,
    'defaultAssertionLifetime' => 0,
    'sessionMaximumAge' => 0,
    'sessionTimeout' => 0
  ],
  'keyStoreCredentialPassword' => '',
  'role' => '',
  'signMetadata' => null,
  'sp' => [
    'allowShowingTheLoginPortlet' => null,
    'assertionSignatureRequired' => null,
    'clockSkew' => 0,
    'keyStoreEncryptionCredentialPassword' => '',
    'ldapImportEnabled' => null,
    'signAuthnRequest' => null
  ],
  'sslRequired' => null
]));
$request->setRequestUrl('{{baseUrl}}/saml-provider');
$request->setRequestMethod('PATCH');
$request->setBody($body);

$request->setHeaders([
  'content-type' => 'application/json'
]);

$client->enqueue($request)->send();
$response = $client->getResponse();

echo $response->getBody();
$headers=@{}
$headers.Add("content-type", "application/json")
$response = Invoke-WebRequest -Uri '{{baseUrl}}/saml-provider' -Method PATCH -Headers $headers -ContentType 'application/json' -Body '{
  "enabled": false,
  "entityId": "",
  "idp": {
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  },
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": {
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  },
  "sslRequired": false
}'
$headers=@{}
$headers.Add("content-type", "application/json")
$response = Invoke-RestMethod -Uri '{{baseUrl}}/saml-provider' -Method PATCH -Headers $headers -ContentType 'application/json' -Body '{
  "enabled": false,
  "entityId": "",
  "idp": {
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  },
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": {
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  },
  "sslRequired": false
}'
import http.client

conn = http.client.HTTPSConnection("example.com")

payload = "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}"

headers = { 'content-type': "application/json" }

conn.request("PATCH", "/baseUrl/saml-provider", payload, headers)

res = conn.getresponse()
data = res.read()

print(data.decode("utf-8"))
import requests

url = "{{baseUrl}}/saml-provider"

payload = {
    "enabled": False,
    "entityId": "",
    "idp": {
        "authnRequestSignatureRequired": False,
        "defaultAssertionLifetime": 0,
        "sessionMaximumAge": 0,
        "sessionTimeout": 0
    },
    "keyStoreCredentialPassword": "",
    "role": "",
    "signMetadata": False,
    "sp": {
        "allowShowingTheLoginPortlet": False,
        "assertionSignatureRequired": False,
        "clockSkew": 0,
        "keyStoreEncryptionCredentialPassword": "",
        "ldapImportEnabled": False,
        "signAuthnRequest": False
    },
    "sslRequired": False
}
headers = {"content-type": "application/json"}

response = requests.patch(url, json=payload, headers=headers)

print(response.json())
library(httr)

url <- "{{baseUrl}}/saml-provider"

payload <- "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}"

encode <- "json"

response <- VERB("PATCH", url, body = payload, content_type("application/json"), encode = encode)

content(response, "text")
require 'uri'
require 'net/http'

url = URI("{{baseUrl}}/saml-provider")

http = Net::HTTP.new(url.host, url.port)
http.use_ssl = true

request = Net::HTTP::Patch.new(url)
request["content-type"] = 'application/json'
request.body = "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}"

response = http.request(request)
puts response.read_body
require 'faraday'

conn = Faraday.new(
  url: 'https://example.com',
  headers: {'Content-Type' => 'application/json'}
)

response = conn.patch('/baseUrl/saml-provider') do |req|
  req.body = "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}"
end

puts response.status
puts response.body
use std::str::FromStr;
use serde_json::json;
use reqwest;

#[tokio::main]
pub async fn main() {
    let url = "{{baseUrl}}/saml-provider";

    let payload = json!({
        "enabled": false,
        "entityId": "",
        "idp": json!({
            "authnRequestSignatureRequired": false,
            "defaultAssertionLifetime": 0,
            "sessionMaximumAge": 0,
            "sessionTimeout": 0
        }),
        "keyStoreCredentialPassword": "",
        "role": "",
        "signMetadata": false,
        "sp": json!({
            "allowShowingTheLoginPortlet": false,
            "assertionSignatureRequired": false,
            "clockSkew": 0,
            "keyStoreEncryptionCredentialPassword": "",
            "ldapImportEnabled": false,
            "signAuthnRequest": false
        }),
        "sslRequired": false
    });

    let mut headers = reqwest::header::HeaderMap::new();
    headers.insert("content-type", "application/json".parse().unwrap());

    let client = reqwest::Client::new();
    let response = client.request(reqwest::Method::from_str("PATCH").unwrap(), url)
        .headers(headers)
        .json(&payload)
        .send()
        .await;

    let results = response.unwrap()
        .json::()
        .await
        .unwrap();

    dbg!(results);
}
curl --request PATCH \
  --url {{baseUrl}}/saml-provider \
  --header 'content-type: application/json' \
  --data '{
  "enabled": false,
  "entityId": "",
  "idp": {
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  },
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": {
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  },
  "sslRequired": false
}'
echo '{
  "enabled": false,
  "entityId": "",
  "idp": {
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  },
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": {
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  },
  "sslRequired": false
}' |  \
  http PATCH {{baseUrl}}/saml-provider \
  content-type:application/json
wget --quiet \
  --method PATCH \
  --header 'content-type: application/json' \
  --body-data '{\n  "enabled": false,\n  "entityId": "",\n  "idp": {\n    "authnRequestSignatureRequired": false,\n    "defaultAssertionLifetime": 0,\n    "sessionMaximumAge": 0,\n    "sessionTimeout": 0\n  },\n  "keyStoreCredentialPassword": "",\n  "role": "",\n  "signMetadata": false,\n  "sp": {\n    "allowShowingTheLoginPortlet": false,\n    "assertionSignatureRequired": false,\n    "clockSkew": 0,\n    "keyStoreEncryptionCredentialPassword": "",\n    "ldapImportEnabled": false,\n    "signAuthnRequest": false\n  },\n  "sslRequired": false\n}' \
  --output-document \
  - {{baseUrl}}/saml-provider
import Foundation

let headers = ["content-type": "application/json"]
let parameters = [
  "enabled": false,
  "entityId": "",
  "idp": [
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  ],
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": [
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  ],
  "sslRequired": false
] as [String : Any]

let postData = JSONSerialization.data(withJSONObject: parameters, options: [])

let request = NSMutableURLRequest(url: NSURL(string: "{{baseUrl}}/saml-provider")! as URL,
                                        cachePolicy: .useProtocolCachePolicy,
                                    timeoutInterval: 10.0)
request.httpMethod = "PATCH"
request.allHTTPHeaderFields = headers
request.httpBody = postData as Data

let session = URLSession.shared
let dataTask = session.dataTask(with: request as URLRequest, completionHandler: { (data, response, error) -> Void in
  if (error != nil) {
    print(error as Any)
  } else {
    let httpResponse = response as? HTTPURLResponse
    print(httpResponse)
  }
})

dataTask.resume()
POST postSamlProvider
{{baseUrl}}/saml-provider
BODY json

{
  "enabled": false,
  "entityId": "",
  "idp": {
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  },
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": {
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  },
  "sslRequired": false
}
Examples
REQUEST

CURL *hnd = curl_easy_init();

curl_easy_setopt(hnd, CURLOPT_CUSTOMREQUEST, "POST");
curl_easy_setopt(hnd, CURLOPT_URL, "{{baseUrl}}/saml-provider");

struct curl_slist *headers = NULL;
headers = curl_slist_append(headers, "content-type: application/json");
curl_easy_setopt(hnd, CURLOPT_HTTPHEADER, headers);

curl_easy_setopt(hnd, CURLOPT_POSTFIELDS, "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}");

CURLcode ret = curl_easy_perform(hnd);
(require '[clj-http.client :as client])

(client/post "{{baseUrl}}/saml-provider" {:content-type :json
                                                          :form-params {:enabled false
                                                                        :entityId ""
                                                                        :idp {:authnRequestSignatureRequired false
                                                                              :defaultAssertionLifetime 0
                                                                              :sessionMaximumAge 0
                                                                              :sessionTimeout 0}
                                                                        :keyStoreCredentialPassword ""
                                                                        :role ""
                                                                        :signMetadata false
                                                                        :sp {:allowShowingTheLoginPortlet false
                                                                             :assertionSignatureRequired false
                                                                             :clockSkew 0
                                                                             :keyStoreEncryptionCredentialPassword ""
                                                                             :ldapImportEnabled false
                                                                             :signAuthnRequest false}
                                                                        :sslRequired false}})
require "http/client"

url = "{{baseUrl}}/saml-provider"
headers = HTTP::Headers{
  "content-type" => "application/json"
}
reqBody = "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}"

response = HTTP::Client.post url, headers: headers, body: reqBody
puts response.body
using System.Net.Http.Headers;
var client = new HttpClient();
var request = new HttpRequestMessage
{
    Method = HttpMethod.Post,
    RequestUri = new Uri("{{baseUrl}}/saml-provider"),
    Content = new StringContent("{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}")
    {
        Headers =
        {
            ContentType = new MediaTypeHeaderValue("application/json")
        }
    }
};
using (var response = await client.SendAsync(request))
{
    response.EnsureSuccessStatusCode();
    var body = await response.Content.ReadAsStringAsync();
    Console.WriteLine(body);
}
var client = new RestClient("{{baseUrl}}/saml-provider");
var request = new RestRequest("", Method.Post);
request.AddHeader("content-type", "application/json");
request.AddParameter("application/json", "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}", ParameterType.RequestBody);
var response = client.Execute(request);
package main

import (
	"fmt"
	"strings"
	"net/http"
	"io"
)

func main() {

	url := "{{baseUrl}}/saml-provider"

	payload := strings.NewReader("{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}")

	req, _ := http.NewRequest("POST", url, payload)

	req.Header.Add("content-type", "application/json")

	res, _ := http.DefaultClient.Do(req)

	defer res.Body.Close()
	body, _ := io.ReadAll(res.Body)

	fmt.Println(res)
	fmt.Println(string(body))

}
POST /baseUrl/saml-provider HTTP/1.1
Content-Type: application/json
Host: example.com
Content-Length: 514

{
  "enabled": false,
  "entityId": "",
  "idp": {
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  },
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": {
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  },
  "sslRequired": false
}
AsyncHttpClient client = new DefaultAsyncHttpClient();
client.prepare("POST", "{{baseUrl}}/saml-provider")
  .setHeader("content-type", "application/json")
  .setBody("{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}")
  .execute()
  .toCompletableFuture()
  .thenAccept(System.out::println)
  .join();

client.close();
HttpRequest request = HttpRequest.newBuilder()
    .uri(URI.create("{{baseUrl}}/saml-provider"))
    .header("content-type", "application/json")
    .method("POST", HttpRequest.BodyPublishers.ofString("{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}"))
    .build();
HttpResponse response = HttpClient.newHttpClient().send(request, HttpResponse.BodyHandlers.ofString());
System.out.println(response.body());
OkHttpClient client = new OkHttpClient();

MediaType mediaType = MediaType.parse("application/json");
RequestBody body = RequestBody.create(mediaType, "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}");
Request request = new Request.Builder()
  .url("{{baseUrl}}/saml-provider")
  .post(body)
  .addHeader("content-type", "application/json")
  .build();

Response response = client.newCall(request).execute();
HttpResponse response = Unirest.post("{{baseUrl}}/saml-provider")
  .header("content-type", "application/json")
  .body("{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}")
  .asString();
const data = JSON.stringify({
  enabled: false,
  entityId: '',
  idp: {
    authnRequestSignatureRequired: false,
    defaultAssertionLifetime: 0,
    sessionMaximumAge: 0,
    sessionTimeout: 0
  },
  keyStoreCredentialPassword: '',
  role: '',
  signMetadata: false,
  sp: {
    allowShowingTheLoginPortlet: false,
    assertionSignatureRequired: false,
    clockSkew: 0,
    keyStoreEncryptionCredentialPassword: '',
    ldapImportEnabled: false,
    signAuthnRequest: false
  },
  sslRequired: false
});

const xhr = new XMLHttpRequest();
xhr.withCredentials = true;

xhr.addEventListener('readystatechange', function () {
  if (this.readyState === this.DONE) {
    console.log(this.responseText);
  }
});

xhr.open('POST', '{{baseUrl}}/saml-provider');
xhr.setRequestHeader('content-type', 'application/json');

xhr.send(data);
import axios from 'axios';

const options = {
  method: 'POST',
  url: '{{baseUrl}}/saml-provider',
  headers: {'content-type': 'application/json'},
  data: {
    enabled: false,
    entityId: '',
    idp: {
      authnRequestSignatureRequired: false,
      defaultAssertionLifetime: 0,
      sessionMaximumAge: 0,
      sessionTimeout: 0
    },
    keyStoreCredentialPassword: '',
    role: '',
    signMetadata: false,
    sp: {
      allowShowingTheLoginPortlet: false,
      assertionSignatureRequired: false,
      clockSkew: 0,
      keyStoreEncryptionCredentialPassword: '',
      ldapImportEnabled: false,
      signAuthnRequest: false
    },
    sslRequired: false
  }
};

try {
  const { data } = await axios.request(options);
  console.log(data);
} catch (error) {
  console.error(error);
}
const url = '{{baseUrl}}/saml-provider';
const options = {
  method: 'POST',
  headers: {'content-type': 'application/json'},
  body: '{"enabled":false,"entityId":"","idp":{"authnRequestSignatureRequired":false,"defaultAssertionLifetime":0,"sessionMaximumAge":0,"sessionTimeout":0},"keyStoreCredentialPassword":"","role":"","signMetadata":false,"sp":{"allowShowingTheLoginPortlet":false,"assertionSignatureRequired":false,"clockSkew":0,"keyStoreEncryptionCredentialPassword":"","ldapImportEnabled":false,"signAuthnRequest":false},"sslRequired":false}'
};

try {
  const response = await fetch(url, options);
  const data = await response.json();
  console.log(data);
} catch (error) {
  console.error(error);
}
const settings = {
  async: true,
  crossDomain: true,
  url: '{{baseUrl}}/saml-provider',
  method: 'POST',
  headers: {
    'content-type': 'application/json'
  },
  processData: false,
  data: '{\n  "enabled": false,\n  "entityId": "",\n  "idp": {\n    "authnRequestSignatureRequired": false,\n    "defaultAssertionLifetime": 0,\n    "sessionMaximumAge": 0,\n    "sessionTimeout": 0\n  },\n  "keyStoreCredentialPassword": "",\n  "role": "",\n  "signMetadata": false,\n  "sp": {\n    "allowShowingTheLoginPortlet": false,\n    "assertionSignatureRequired": false,\n    "clockSkew": 0,\n    "keyStoreEncryptionCredentialPassword": "",\n    "ldapImportEnabled": false,\n    "signAuthnRequest": false\n  },\n  "sslRequired": false\n}'
};

$.ajax(settings).done(function (response) {
  console.log(response);
});
val client = OkHttpClient()

val mediaType = MediaType.parse("application/json")
val body = RequestBody.create(mediaType, "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}")
val request = Request.Builder()
  .url("{{baseUrl}}/saml-provider")
  .post(body)
  .addHeader("content-type", "application/json")
  .build()

val response = client.newCall(request).execute()
const http = require('https');

const options = {
  method: 'POST',
  hostname: 'example.com',
  port: null,
  path: '/baseUrl/saml-provider',
  headers: {
    'content-type': 'application/json'
  }
};

const req = http.request(options, function (res) {
  const chunks = [];

  res.on('data', function (chunk) {
    chunks.push(chunk);
  });

  res.on('end', function () {
    const body = Buffer.concat(chunks);
    console.log(body.toString());
  });
});

req.write(JSON.stringify({
  enabled: false,
  entityId: '',
  idp: {
    authnRequestSignatureRequired: false,
    defaultAssertionLifetime: 0,
    sessionMaximumAge: 0,
    sessionTimeout: 0
  },
  keyStoreCredentialPassword: '',
  role: '',
  signMetadata: false,
  sp: {
    allowShowingTheLoginPortlet: false,
    assertionSignatureRequired: false,
    clockSkew: 0,
    keyStoreEncryptionCredentialPassword: '',
    ldapImportEnabled: false,
    signAuthnRequest: false
  },
  sslRequired: false
}));
req.end();
const request = require('request');

const options = {
  method: 'POST',
  url: '{{baseUrl}}/saml-provider',
  headers: {'content-type': 'application/json'},
  body: {
    enabled: false,
    entityId: '',
    idp: {
      authnRequestSignatureRequired: false,
      defaultAssertionLifetime: 0,
      sessionMaximumAge: 0,
      sessionTimeout: 0
    },
    keyStoreCredentialPassword: '',
    role: '',
    signMetadata: false,
    sp: {
      allowShowingTheLoginPortlet: false,
      assertionSignatureRequired: false,
      clockSkew: 0,
      keyStoreEncryptionCredentialPassword: '',
      ldapImportEnabled: false,
      signAuthnRequest: false
    },
    sslRequired: false
  },
  json: true
};

request(options, function (error, response, body) {
  if (error) throw new Error(error);

  console.log(body);
});
const unirest = require('unirest');

const req = unirest('POST', '{{baseUrl}}/saml-provider');

req.headers({
  'content-type': 'application/json'
});

req.type('json');
req.send({
  enabled: false,
  entityId: '',
  idp: {
    authnRequestSignatureRequired: false,
    defaultAssertionLifetime: 0,
    sessionMaximumAge: 0,
    sessionTimeout: 0
  },
  keyStoreCredentialPassword: '',
  role: '',
  signMetadata: false,
  sp: {
    allowShowingTheLoginPortlet: false,
    assertionSignatureRequired: false,
    clockSkew: 0,
    keyStoreEncryptionCredentialPassword: '',
    ldapImportEnabled: false,
    signAuthnRequest: false
  },
  sslRequired: false
});

req.end(function (res) {
  if (res.error) throw new Error(res.error);

  console.log(res.body);
});
const axios = require('axios').default;

const options = {
  method: 'POST',
  url: '{{baseUrl}}/saml-provider',
  headers: {'content-type': 'application/json'},
  data: {
    enabled: false,
    entityId: '',
    idp: {
      authnRequestSignatureRequired: false,
      defaultAssertionLifetime: 0,
      sessionMaximumAge: 0,
      sessionTimeout: 0
    },
    keyStoreCredentialPassword: '',
    role: '',
    signMetadata: false,
    sp: {
      allowShowingTheLoginPortlet: false,
      assertionSignatureRequired: false,
      clockSkew: 0,
      keyStoreEncryptionCredentialPassword: '',
      ldapImportEnabled: false,
      signAuthnRequest: false
    },
    sslRequired: false
  }
};

try {
  const { data } = await axios.request(options);
  console.log(data);
} catch (error) {
  console.error(error);
}
const fetch = require('node-fetch');

const url = '{{baseUrl}}/saml-provider';
const options = {
  method: 'POST',
  headers: {'content-type': 'application/json'},
  body: '{"enabled":false,"entityId":"","idp":{"authnRequestSignatureRequired":false,"defaultAssertionLifetime":0,"sessionMaximumAge":0,"sessionTimeout":0},"keyStoreCredentialPassword":"","role":"","signMetadata":false,"sp":{"allowShowingTheLoginPortlet":false,"assertionSignatureRequired":false,"clockSkew":0,"keyStoreEncryptionCredentialPassword":"","ldapImportEnabled":false,"signAuthnRequest":false},"sslRequired":false}'
};

try {
  const response = await fetch(url, options);
  const data = await response.json();
  console.log(data);
} catch (error) {
  console.error(error);
}
#import 

NSDictionary *headers = @{ @"content-type": @"application/json" };
NSDictionary *parameters = @{ @"enabled": @NO,
                              @"entityId": @"",
                              @"idp": @{ @"authnRequestSignatureRequired": @NO, @"defaultAssertionLifetime": @0, @"sessionMaximumAge": @0, @"sessionTimeout": @0 },
                              @"keyStoreCredentialPassword": @"",
                              @"role": @"",
                              @"signMetadata": @NO,
                              @"sp": @{ @"allowShowingTheLoginPortlet": @NO, @"assertionSignatureRequired": @NO, @"clockSkew": @0, @"keyStoreEncryptionCredentialPassword": @"", @"ldapImportEnabled": @NO, @"signAuthnRequest": @NO },
                              @"sslRequired": @NO };

NSData *postData = [NSJSONSerialization dataWithJSONObject:parameters options:0 error:nil];

NSMutableURLRequest *request = [NSMutableURLRequest requestWithURL:[NSURL URLWithString:@"{{baseUrl}}/saml-provider"]
                                                       cachePolicy:NSURLRequestUseProtocolCachePolicy
                                                   timeoutInterval:10.0];
[request setHTTPMethod:@"POST"];
[request setAllHTTPHeaderFields:headers];
[request setHTTPBody:postData];

NSURLSession *session = [NSURLSession sharedSession];
NSURLSessionDataTask *dataTask = [session dataTaskWithRequest:request
                                            completionHandler:^(NSData *data, NSURLResponse *response, NSError *error) {
                                                if (error) {
                                                    NSLog(@"%@", error);
                                                } else {
                                                    NSHTTPURLResponse *httpResponse = (NSHTTPURLResponse *) response;
                                                    NSLog(@"%@", httpResponse);
                                                }
                                            }];
[dataTask resume];
open Cohttp_lwt_unix
open Cohttp
open Lwt

let uri = Uri.of_string "{{baseUrl}}/saml-provider" in
let headers = Header.add (Header.init ()) "content-type" "application/json" in
let body = Cohttp_lwt_body.of_string "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}" in

Client.call ~headers ~body `POST uri
>>= fun (res, body_stream) ->
  (* Do stuff with the result *)
 "{{baseUrl}}/saml-provider",
  CURLOPT_RETURNTRANSFER => true,
  CURLOPT_ENCODING => "",
  CURLOPT_MAXREDIRS => 10,
  CURLOPT_TIMEOUT => 30,
  CURLOPT_HTTP_VERSION => CURL_HTTP_VERSION_1_1,
  CURLOPT_CUSTOMREQUEST => "POST",
  CURLOPT_POSTFIELDS => json_encode([
    'enabled' => null,
    'entityId' => '',
    'idp' => [
        'authnRequestSignatureRequired' => null,
        'defaultAssertionLifetime' => 0,
        'sessionMaximumAge' => 0,
        'sessionTimeout' => 0
    ],
    'keyStoreCredentialPassword' => '',
    'role' => '',
    'signMetadata' => null,
    'sp' => [
        'allowShowingTheLoginPortlet' => null,
        'assertionSignatureRequired' => null,
        'clockSkew' => 0,
        'keyStoreEncryptionCredentialPassword' => '',
        'ldapImportEnabled' => null,
        'signAuthnRequest' => null
    ],
    'sslRequired' => null
  ]),
  CURLOPT_HTTPHEADER => [
    "content-type: application/json"
  ],
]);

$response = curl_exec($curl);
$err = curl_error($curl);

curl_close($curl);

if ($err) {
  echo "cURL Error #:" . $err;
} else {
  echo $response;
}
request('POST', '{{baseUrl}}/saml-provider', [
  'body' => '{
  "enabled": false,
  "entityId": "",
  "idp": {
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  },
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": {
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  },
  "sslRequired": false
}',
  'headers' => [
    'content-type' => 'application/json',
  ],
]);

echo $response->getBody();
setUrl('{{baseUrl}}/saml-provider');
$request->setMethod(HTTP_METH_POST);

$request->setHeaders([
  'content-type' => 'application/json'
]);

$request->setContentType('application/json');
$request->setBody(json_encode([
  'enabled' => null,
  'entityId' => '',
  'idp' => [
    'authnRequestSignatureRequired' => null,
    'defaultAssertionLifetime' => 0,
    'sessionMaximumAge' => 0,
    'sessionTimeout' => 0
  ],
  'keyStoreCredentialPassword' => '',
  'role' => '',
  'signMetadata' => null,
  'sp' => [
    'allowShowingTheLoginPortlet' => null,
    'assertionSignatureRequired' => null,
    'clockSkew' => 0,
    'keyStoreEncryptionCredentialPassword' => '',
    'ldapImportEnabled' => null,
    'signAuthnRequest' => null
  ],
  'sslRequired' => null
]));

try {
  $response = $request->send();

  echo $response->getBody();
} catch (HttpException $ex) {
  echo $ex;
}
append(json_encode([
  'enabled' => null,
  'entityId' => '',
  'idp' => [
    'authnRequestSignatureRequired' => null,
    'defaultAssertionLifetime' => 0,
    'sessionMaximumAge' => 0,
    'sessionTimeout' => 0
  ],
  'keyStoreCredentialPassword' => '',
  'role' => '',
  'signMetadata' => null,
  'sp' => [
    'allowShowingTheLoginPortlet' => null,
    'assertionSignatureRequired' => null,
    'clockSkew' => 0,
    'keyStoreEncryptionCredentialPassword' => '',
    'ldapImportEnabled' => null,
    'signAuthnRequest' => null
  ],
  'sslRequired' => null
]));
$request->setRequestUrl('{{baseUrl}}/saml-provider');
$request->setRequestMethod('POST');
$request->setBody($body);

$request->setHeaders([
  'content-type' => 'application/json'
]);

$client->enqueue($request)->send();
$response = $client->getResponse();

echo $response->getBody();
$headers=@{}
$headers.Add("content-type", "application/json")
$response = Invoke-WebRequest -Uri '{{baseUrl}}/saml-provider' -Method POST -Headers $headers -ContentType 'application/json' -Body '{
  "enabled": false,
  "entityId": "",
  "idp": {
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  },
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": {
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  },
  "sslRequired": false
}'
$headers=@{}
$headers.Add("content-type", "application/json")
$response = Invoke-RestMethod -Uri '{{baseUrl}}/saml-provider' -Method POST -Headers $headers -ContentType 'application/json' -Body '{
  "enabled": false,
  "entityId": "",
  "idp": {
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  },
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": {
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  },
  "sslRequired": false
}'
import http.client

conn = http.client.HTTPSConnection("example.com")

payload = "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}"

headers = { 'content-type': "application/json" }

conn.request("POST", "/baseUrl/saml-provider", payload, headers)

res = conn.getresponse()
data = res.read()

print(data.decode("utf-8"))
import requests

url = "{{baseUrl}}/saml-provider"

payload = {
    "enabled": False,
    "entityId": "",
    "idp": {
        "authnRequestSignatureRequired": False,
        "defaultAssertionLifetime": 0,
        "sessionMaximumAge": 0,
        "sessionTimeout": 0
    },
    "keyStoreCredentialPassword": "",
    "role": "",
    "signMetadata": False,
    "sp": {
        "allowShowingTheLoginPortlet": False,
        "assertionSignatureRequired": False,
        "clockSkew": 0,
        "keyStoreEncryptionCredentialPassword": "",
        "ldapImportEnabled": False,
        "signAuthnRequest": False
    },
    "sslRequired": False
}
headers = {"content-type": "application/json"}

response = requests.post(url, json=payload, headers=headers)

print(response.json())
library(httr)

url <- "{{baseUrl}}/saml-provider"

payload <- "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}"

encode <- "json"

response <- VERB("POST", url, body = payload, content_type("application/json"), encode = encode)

content(response, "text")
require 'uri'
require 'net/http'

url = URI("{{baseUrl}}/saml-provider")

http = Net::HTTP.new(url.host, url.port)
http.use_ssl = true

request = Net::HTTP::Post.new(url)
request["content-type"] = 'application/json'
request.body = "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}"

response = http.request(request)
puts response.read_body
require 'faraday'

conn = Faraday.new(
  url: 'https://example.com',
  headers: {'Content-Type' => 'application/json'}
)

response = conn.post('/baseUrl/saml-provider') do |req|
  req.body = "{\n  \"enabled\": false,\n  \"entityId\": \"\",\n  \"idp\": {\n    \"authnRequestSignatureRequired\": false,\n    \"defaultAssertionLifetime\": 0,\n    \"sessionMaximumAge\": 0,\n    \"sessionTimeout\": 0\n  },\n  \"keyStoreCredentialPassword\": \"\",\n  \"role\": \"\",\n  \"signMetadata\": false,\n  \"sp\": {\n    \"allowShowingTheLoginPortlet\": false,\n    \"assertionSignatureRequired\": false,\n    \"clockSkew\": 0,\n    \"keyStoreEncryptionCredentialPassword\": \"\",\n    \"ldapImportEnabled\": false,\n    \"signAuthnRequest\": false\n  },\n  \"sslRequired\": false\n}"
end

puts response.status
puts response.body
use serde_json::json;
use reqwest;

#[tokio::main]
pub async fn main() {
    let url = "{{baseUrl}}/saml-provider";

    let payload = json!({
        "enabled": false,
        "entityId": "",
        "idp": json!({
            "authnRequestSignatureRequired": false,
            "defaultAssertionLifetime": 0,
            "sessionMaximumAge": 0,
            "sessionTimeout": 0
        }),
        "keyStoreCredentialPassword": "",
        "role": "",
        "signMetadata": false,
        "sp": json!({
            "allowShowingTheLoginPortlet": false,
            "assertionSignatureRequired": false,
            "clockSkew": 0,
            "keyStoreEncryptionCredentialPassword": "",
            "ldapImportEnabled": false,
            "signAuthnRequest": false
        }),
        "sslRequired": false
    });

    let mut headers = reqwest::header::HeaderMap::new();
    headers.insert("content-type", "application/json".parse().unwrap());

    let client = reqwest::Client::new();
    let response = client.post(url)
        .headers(headers)
        .json(&payload)
        .send()
        .await;

    let results = response.unwrap()
        .json::()
        .await
        .unwrap();

    dbg!(results);
}
curl --request POST \
  --url {{baseUrl}}/saml-provider \
  --header 'content-type: application/json' \
  --data '{
  "enabled": false,
  "entityId": "",
  "idp": {
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  },
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": {
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  },
  "sslRequired": false
}'
echo '{
  "enabled": false,
  "entityId": "",
  "idp": {
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  },
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": {
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  },
  "sslRequired": false
}' |  \
  http POST {{baseUrl}}/saml-provider \
  content-type:application/json
wget --quiet \
  --method POST \
  --header 'content-type: application/json' \
  --body-data '{\n  "enabled": false,\n  "entityId": "",\n  "idp": {\n    "authnRequestSignatureRequired": false,\n    "defaultAssertionLifetime": 0,\n    "sessionMaximumAge": 0,\n    "sessionTimeout": 0\n  },\n  "keyStoreCredentialPassword": "",\n  "role": "",\n  "signMetadata": false,\n  "sp": {\n    "allowShowingTheLoginPortlet": false,\n    "assertionSignatureRequired": false,\n    "clockSkew": 0,\n    "keyStoreEncryptionCredentialPassword": "",\n    "ldapImportEnabled": false,\n    "signAuthnRequest": false\n  },\n  "sslRequired": false\n}' \
  --output-document \
  - {{baseUrl}}/saml-provider
import Foundation

let headers = ["content-type": "application/json"]
let parameters = [
  "enabled": false,
  "entityId": "",
  "idp": [
    "authnRequestSignatureRequired": false,
    "defaultAssertionLifetime": 0,
    "sessionMaximumAge": 0,
    "sessionTimeout": 0
  ],
  "keyStoreCredentialPassword": "",
  "role": "",
  "signMetadata": false,
  "sp": [
    "allowShowingTheLoginPortlet": false,
    "assertionSignatureRequired": false,
    "clockSkew": 0,
    "keyStoreEncryptionCredentialPassword": "",
    "ldapImportEnabled": false,
    "signAuthnRequest": false
  ],
  "sslRequired": false
] as [String : Any]

let postData = JSONSerialization.data(withJSONObject: parameters, options: [])

let request = NSMutableURLRequest(url: NSURL(string: "{{baseUrl}}/saml-provider")! as URL,
                                        cachePolicy: .useProtocolCachePolicy,
                                    timeoutInterval: 10.0)
request.httpMethod = "POST"
request.allHTTPHeaderFields = headers
request.httpBody = postData as Data

let session = URLSession.shared
let dataTask = session.dataTask(with: request as URLRequest, completionHandler: { (data, response, error) -> Void in
  if (error != nil) {
    print(error as Any)
  } else {
    let httpResponse = response as? HTTPURLResponse
    print(httpResponse)
  }
})

dataTask.resume()