Use an Email MFA Action to Authenticate Users
Number of APIs: 19
This activity shows you how to create a sign-on policy with an Email MFA action, initiate an authorization request, and use the flow APIs to complete the authorization.
The following operations are supported by the PingOne APIs:
- Create an application
- Create a sign-on policy
- Create an Email MFA sign-on policy action
- Create a device authentication policy
- Create a user
- Initiate an authorize request
- Use flow APIs to complete the MFA action
Prerequisites
Get an access token from the worker application that you created in Getting Started with the PingOne APIs. To get a token from a different worker application in an alternate sandbox environment, run the token request endpoint using the client ID and client secret of your chosen worker app to authenticate the request. For more information, see GET a Worker Application Access Token.
Workflow order of operations
To complete a MFA sign on, the following tasks must be completed successfully:
Make a
POST
request to/environments/{{envID}}/applications
to add a new application to the specified environment.Make a
GET
request to/environments/{{envID}}/resources
to return a list of all resource entities associated with the specified environment.Make a
GET
request to/environments/{{envID}}/resources/{{resourceID}}/scopes
to list all scopes associated with a specified resource.Make a
POST
request to/environments/{{envID}}/applications/{{appID}}/grants
to create a new resource access grant for the application.Make a
POST
request to/environments/{{envID}}/signOnPolicies
to create a new sign-on policy.Make a
POST
request to/environments/{{envID}}/signOnPolicies/{{signOnPolicyID}}/actions
to define the Email MFA action associated with this sign-on policy.Make a
POST
request to/environments/{{envID}}/applications/{{appID}}/signOnPolicyAssignments
to associate the sign-on policy with the application.Make a
POST
request to/environments/{{envID}}/populations
to create a new population resource.Make a
POST
request to/environments/{{envID}}/users
to create a user who will be assigned to the new population resource.Make a
POST
request to/environments/{{envID}}/users/{{userID}}/password
to set the new user's password.Make a
POST
request to/environments/{{envID}}/users/{{userID}}/mfaEnabled
to enable MFA actions for this user.Make a
POST
request to/environments/{{envID}}/deviceAuthenticationPolicies
to create the device authentication policy.Make a
POST
request to/environments/{{envID}}/users/{{userID}}/devices
to associate an Email MFA device with this user.Make a
POST
request to/{{envID}}/as/authorize
to obtain an authorization grant. This request starts the authorization flow.Make a
GET
request to/{{envID}}/flows/{{flowID}}
to initiate the sign-on flow.To complete the sign-on action, make a
POST
request toGET /{{envID}}/flows/{{flowID}}
and provide the user's username for a user lookup action.To complete the Eamil MFA action, make a
POST
request toGET /{{envID}}/flows/{{flowID}}
and provide the one-time passcode.Make a
GET
request to/{{envID}}/as/resume?flowId={{flowID}}
to call the resume endpoint and return the auth code.Make a
GET
request to/environments/{{envID}}/applications/{{appID}}/secret
to return the new application'ssecret
attribute, which is needed for the token request.Make a
POST
request to/{{envID}}/as/token
to exchange the auth code for an access token.
-
Step 5: Create a sign-on policy POST {{apiPath}}/environments/{{envID}}/signOnPolicies
-
Step 3: Get all OIDC Scopes GET {{apiPath}}/environments/{{envID}}/resources/{{openidResourceID}}/scopes
-
Step 4: Assign a resource grant to the web application POST {{apiPath}}/environments/{{envID}}/applications/{{webApp4MfaId}}/grants
-
Step 6: Create an Email MFA sign-on policy action POST {{apiPath}}/environments/{{envID}}/signOnPolicies/{{mfaSignonPolicyID}}/actions
-
Step 7: Assign the sign-on policy to the web application POST {{apiPath}}/environments/{{envID}}/applications/{{webApp4MfaId}}/signOnPolicyAssignments
-
Step 8: Create a population for MFA users POST {{apiPath}}/environments/{{envID}}/populations
-
Step 9: Create a user POST {{apiPath}}/environments/{{envID}}/users
-
Step 10: Set user password PUT {{apiPath}}/environments/{{envID}}/users/{{MFAUserID}}/password
-
Step 12: Create the device authentication policy POST {{apiPath}}/environments/{{envID}}/deviceAuthenticationPolicies
-
Step 13: Set user device (Email) POST {{apiPath}}/environments/{{envID}}/users/{{MFAUserID}}/devices