Identity Provider (IDP) & MFA
Orchestrate user identities, implement multi-factor authentication (TOTP), and manage security audit trails.
Identity Provider (IDP) API
The Identity Provider (IDP) service centralizes user identity management and provides robust secondary authentication layers. It allows organizations to link external user identifiers to a secure, managed identity capable of Multi-Factor Authentication (MFA) via Time-based One-Time Passwords (TOTP) and advanced risk assessment (Sentinel).
Identity Management
Provision External User
Provision a new managed identity within the IDP ecosystem. This creates a security context linked to your platform's internal external_id.
idp:writeApiAccessPermission::IDP_WRITEQuery Parameters
No query parameters required.
Request Body
{
"user": {
"external_id": "ORG_USR_9921_AFG"
}
}user.external_idstringRequiredResponses
User identity successfully provisioned.
{
"user": {
"id": "6908bffd...",
"external_id": "ORG_USR_9921_AFG",
"status": "active"
}
}Identity already exists for the specified external_id.
{
"error": "User with this external_id already exists for this company"
}Retrieve Identity Profile
Fetch the security profile for a specific user. This includes authentication capabilities (MFA status), operational status (locked/active), and audit metadata.
idp:readApiAccessPermission::IDP_READQuery Parameters
externalUserIdstringRequiredResponses
Identity profile retrieved.
{
"id": "6908...",
"external_id": "ORG_USR_9921_AFG",
"status": "active",
"has_otp": true,
"has_passkeys": false,
"is_locked": false,
"failed_attempts": 0,
"saas_client_id": "67c9..."
}Multi-Factor Authentication (MFA)
Configuration of TOTP Secret
Generate a new TOTP secret and QR code payload to enable secondary authentication. Scanning this payload into an authenticator application (e.g., Microsoft/Google Authenticator) completes the setup.
idp:writeApiAccessPermission::IDP_WRITEQuery Parameters
externalUserIdstringRequiredRequest Body
{
"otp": {
"issuer_name": "Acme Enterprise",
"account_name": "alexander@enterprise.com"
}
}otp.issuer_namestringRequiredotp.account_namestringRequiredResponses
New MFA secret successfully generated.
{
"user": {
"external_id": "ORG_USR_9921_AFG",
"new_otp_secret": "REDACTED_OTP_SECRET",
"qrcode_payload": "otpauth://totp/Acme+Enterprise:alexander%40enterprise.com?secret=REDACTED_OTP_SECRET&issuer=Acme+Enterprise",
"is_setup_complete": true
}
}Verify Authentication Code
Validate a 6-digit TOTP code (or a one-time backup code) to finalize the authentication process.
idp:writeApiAccessPermission::IDP_WRITEQuery Parameters
No query parameters required.
Request Body
{
"otp": {
"id": "ORG_USR_9921_AFG",
"code": "552192"
}
}otp.idstringRequiredotp.codestringRequiredResponses
Authentication successful.
{
"status": "success",
"id": "ORG_USR_9921_AFG",
"message": "OTP verified successfully."
}Provision Backup Codes
Generate a collection of single-use backup codes. These allow users to regain access if the primary MFA device is unavailable.
idp:writeApiAccessPermission::IDP_WRITEQuery Parameters
externalUserIdstringRequiredResponses
Set of 10 backup codes generated.
{
"user": {
"id": "ORG_USR_9921_AFG",
"backupCodes": [
"ABCD-1234",
"EFGH-5678",
"..."
]
}
}Sentinel Risk Assessment
Sentinel provides a sophisticated analytical layer for evaluating authentication risk in real-time.
Analyze Session Integrity (Discover)
Submit session metadata to Sentinel to perform a risk assessment based on behavioral patterns, network reputation, and environmental context.
sentinel:writeApiAccessPermission::SENTINEL_WRITEQuery Parameters
No query parameters required.
Request Body
{
"sentinel": {
"id": "6908bffd...",
"context": {
"ip": "1.1.1.1",
"ua": "EnterpriseAgent/1.0"
}
}
}sentinel.idstringRequiredsentinel.context.ipstringRequiredsentinel.context.uastringRequiredsentinel.context.user_idstringResponses
Risk assessment completed.
{
"status": "authorized",
"risk_score": 0.05,
"recommendation": "allow"
}High-risk indicators detected.
{
"error": "High risk detection",
"risk_score": 0.95
}