Skip to content

Instantly share code, notes, and snippets.

@srinivasanagandla-okta
srinivasanagandla-okta / AuthenticatorsAdminAPI.md
Last active July 28, 2020 17:45
IDX Authenticators Admin API

Authenticator Admin API

Authenticator Admin API enables an Org Administrator to configure which authenticators are available to end users to be used for signing into applications.

End users would be required to use one or more authenticators depending on the security requirements of the application sign-on policy.

IDX currently supports authenticators for the following:

Knowledge based:
  • Password
  • Security Question

alt text

Example 1

Chain:
    Step 1 -> [facebook, google]
        Step 2 -> [password]
            Step 3 -> [sms]
        Step 2 -> [webauthn]
@srinivasanagandla-okta
srinivasanagandla-okta / gist:d2e90982f94b4b528b3ae9ac6e937222
Last active May 16, 2016 23:41
Return Policy details when MFA is required

Requirements

https://oktawiki.atlassian.net/wiki/pages/viewpage.action?pageId=123044714

Background

Currently Okta enduser UI shows "Remember Device" whenever the policy that requires MFA is either time based or device based. The requirement is to show a meaningful message instead of a generic "Remember Device" message along with the checkbox.

Please refer to the requirements document mentioned above for details.

Proposal

In order for the Okta API caller to show the meaningful message (or to hide the checkbox altogether), the policy evaluation details need to be populated in the response whenever MFA is required.

POST /api/v1/trusted-domains
```json
{
"name": "test",
"baseUrl": "https://trustme.domain.com",
"scopes": [
{"type": "cors"},
{"type": "redirect"}
]
}
@srinivasanagandla-okta
srinivasanagandla-okta / 0_reuse_code.js
Last active August 29, 2015 14:21
Here are some things you can do with Gists in GistBox.
// Use Gists to store code you would like to remember later on
console.log(window); // log the "window" object to the console
@srinivasanagandla-okta
srinivasanagandla-okta / gist:156bc8b8ceac624b6897
Last active August 29, 2015 14:18
Okta Verify Push API Gaps

#Enroll (From UserAgent):

##Request POST {{url}}/api/v1/users/{{userId}}/factors

{
  "factorType"   : "push",
  "provider" 	 : "okta"
}
Assumptions:
1. There would be a "Default" SignOn Policy that "ALLOW" by default on successful authentication
2. There would be a "Default" MFA Policy thats allows "ALL" configured factors to be enrolled/challenged
Policy Configuration Flow:
1. Admin configures "Sign-on" Policy with "factor required" rule
2. Admin then configures "MFA" Policy with list of allowed factors for the Groups
3. (Nice to have) There should be a "Find Policy" button to preview which policy would be evaluated given a User Group / Users

MFA API

Can be organized as three different areas:

  1. Admin API to setup/manage Factors for their Org
  2. User API to enable Users to enroll/activate/reset Factors
  3. Authentication API that actually performs authN using MFA

Links