Use LOGIN and MFA Actions to Authenticate Users
Number of APIs: 18
This activity shows you how to create a sign-on policy with login and mfa actions, initiate an authorization request, and use the flow APIs to complete the authorization.
The following operations are supported by the PingOne APIs:
- Create an application
- Create a sign-on policy
- Create login and MFA sign-on policy actions
- Create a user
- Initiate an authorize request
- Use flow APIs to complete the login and MFA actions
Prerequisites
Get an access token from the worker application that you created in Getting Started with the PingOne APIs. To get a token from a different worker application in an alternate sandbox environment, run the token request endpoint using the client ID and client secret of your chosen worker app to authenticate the request. For more information, see GET a Worker Application Access Token.
Workflow order of operations
To complete a login and MFA sign on, the following tasks must be completed successfully:
- Make a - POSTrequest to- /environments/{{envID}}/applicationsto add a new application to the specified environment.
- Make a - GETrequest to- /environments/{{envID}}/resourcesto return a list of all resource entities associated with the specified environment.
- Make a - GETrequest to- /environments/{{envID}}/resources/{{resourceID}}/scopesto list all scopes associated with a specified resource.
- Make a - POSTrequest to- /environments/{{envID}}/applications/{{appID}}/grantsto create a new resource access grant for the application.
- Make a - POSTrequest to- /environments/{{envID}}/signOnPoliciesto create a new sign-on policy.
- Make a - POSTrequest to- /environments/{{envID}}/signOnPolicies/{{signOnPolicyID}}/actionsto define the login action associated with this sign-on policy.
- Make a - POSTrequest to- /environments/{{envID}}/signOnPolicies/{{signOnPolicyID}}/actionsto define the MFA action associated with this sign-on policy.
- Make a - POSTrequest to- /environments/{{envID}}/applications/{{appID}}/signOnPolicyAssignmentsto associate the sign-on policy with the application.
- Make a - POSTrequest to- /environments/{{envID}}/populationsto create a new population resource.
- Make a - POSTrequest to- /environments/{{envID}}/usersto create a user who will be assigned to the new population resource.
- Make a - POSTrequest to- /environments/{{envID}}/users/{{userID}}/passwordto set the new user's password.
- Make a - POSTrequest to- /environments/{{envID}}/users/{{userID}}/mfaEnabledto enable MFA actions for this user.
- Make a - POSTrequest to- /environments/{{envID}}/users/{{userID}}/devicesto associate an MFA device with this user.
- Make a - POSTrequest to- /{{envID}}/as/authorizeto obtain an authorization grant. This request starts the authorization flow.
- Make a - GETrequest to- /{{envID}}/flows/{{flowID}}to initiate the sign-on flow.
- To complete the login action, make a - POSTrequest to- GET /{{envID}}/flows/{{flowID}}and provide the user's login credentials.
- To complete the MFA action, make a - POSTrequest to- GET /{{envID}}/flows/{{flowID}}and provide the one-time passcode.
- Make a - GETrequest to- /{{envID}}/as/resume?flowId={{flowID}}to call the resume endpoint and return the auth code.
- Make a - GETrequest to- /environments/{{envID}}/applications/{{appID}}/secretto return the new application's- secretattribute, which is needed for the token request.
- Make a - POSTrequest to- /{{envID}}/as/tokento exchange the auth code for an access token.
- 
Step 9: Create a population for MFA users POST {{apiPath}}/environments/{{envID}}/populations 
- 
Step 8: Assign the sign-on policy to the web application POST {{apiPath}}/environments/{{envID}}/applications/{{webApp4MfaId}}/signOnPolicyAssignments 
- 
Step 13: Set user device (SMS) POST {{apiPath}}/environments/{{envID}}/users/{{MFAUserID}}/devices 
- 
Step 1: Create a web application POST {{apiPath}}/environments/{{envID}}/applications 
- 
Step 2: Get all resources GET {{apiPath}}/environments/{{envID}}/resources 
- 
Step 4: Assign a resource grant to the web application POST {{apiPath}}/environments/{{envID}}/applications/{{webApp4MfaId}}/grants 
- 
Step 5: Create a sign-on policy POST {{apiPath}}/environments/{{envID}}/signOnPolicies 
- 
Step 7: Create the MFA sign-on policy action POST {{apiPath}}/environments/{{envID}}/signOnPolicies/{{mfaSignonPolicyID}}/actions 
- 
Step 11: Set user password PUT {{apiPath}}/environments/{{envID}}/users/{{MFAUserID}}/password 
- 
Step 12: Enable user MFA PUT {{apiPath}}/environments/{{envID}}/users/{{MFAUserID}}/mfaEnabled